Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d3r1KVj317.exe

Overview

General Information

Sample name:d3r1KVj317.exe
renamed because original name is a hash value
Original sample name:d5062f9d7dcb69516a2d2af3fb5a0c8d.exe
Analysis ID:1520465
MD5:d5062f9d7dcb69516a2d2af3fb5a0c8d
SHA1:5991f840b94f7855262e4f85ee3bc2faf1a72a9e
SHA256:abf5bda7c2cf8a0f7b57b9e0abecee531818144c30d0f11a68b794cd2c3a6371
Tags:exeuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • d3r1KVj317.exe (PID: 5596 cmdline: "C:\Users\user\Desktop\d3r1KVj317.exe" MD5: D5062F9D7DCB69516A2D2AF3FB5A0C8D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: d3r1KVj317.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.0% probability
Source: d3r1KVj317.exeJoe Sandbox ML: detected
Source: d3r1KVj317.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00695CBB __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,0_2_00695CBB
Source: global trafficTCP traffic: 192.168.2.8:49704 -> 112.74.185.5:8099
Source: Joe Sandbox ViewIP Address: 112.74.185.5 112.74.185.5
Source: unknownTCP traffic detected without corresponding DNS query: 112.74.185.5
Source: unknownTCP traffic detected without corresponding DNS query: 112.74.185.5
Source: unknownTCP traffic detected without corresponding DNS query: 112.74.185.5
Source: unknownTCP traffic detected without corresponding DNS query: 112.74.185.5
Source: d3r1KVj317.exeString found in binary or memory: http://112.74.185.5/3R%E6%8A%80%E6%9C%AF.exe
Source: d3r1KVj317.exeString found in binary or memory: http://api.ttshitu.com/predict
Source: d3r1KVj317.exeString found in binary or memory: http://api.ttshitu.com/predictto16unfunction
Source: d3r1KVj317.exeString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_0069A5D9 GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0069A5D9
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000D330 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000D330
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10021370 GetPropA,NtdllDefWindowProc_A,IsWindowVisible,ShowWindow,NtdllDefWindowProc_A,NtdllDefWindowProc_A,SendMessageA,0_2_10021370
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1001D8E0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,0_2_1001D8E0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10007A30 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10007A30
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10006010 IsWindowEnabled,SendMessageA,SendMessageA,GetWindowRect,IsRectEmpty,PtInRect,PtInRect,GetSystemMenu,GetMenuState,SendMessageA,NtdllDefWindowProc_A,PtInRect,IsIconic,PtInRect,IsZoomed,PtInRect,PtInRect,GetWindowRect,0_2_10006010
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10006210 IsWindowEnabled,SendMessageA,SendMessageA,SendMessageA,IsZoomed,SendMessageA,NtdllDefWindowProc_A,0_2_10006210
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100062B0 IsWindowEnabled,SendMessageA,NtdllDefWindowProc_A,0_2_100062B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10008310 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,0_2_10008310
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1001D330 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1001D330
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10009340 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,CallWindowProcA,GetCursorPos,GetWindowRect,PtInRect,CallWindowProcA,0_2_10009340
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10006350 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10006350
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000C3F0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,InvalidateRect,CallWindowProcA,CallWindowProcA,GetCursorPos,GetWindowRect,PtInRect,CallWindowProcA,0_2_1000C3F0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000E440 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000E440
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100214B0 GetPropA,NtdllDefWindowProc_A,0_2_100214B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10004510 NtdllDefWindowProc_A,0_2_10004510
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10006560 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10006560
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10011630 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,CallWindowProcA,0_2_10011630
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10008710 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,GetParent,0_2_10008710
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000F750 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000F750
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10014790 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10014790
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1001E7F0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1001E7F0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1001C800 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1001C800
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100098B0 GetPropA,NtdllDefWindowProc_A,KillTimer,IsWindowVisible,IsIconic,SetTimer,0_2_100098B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100048E0 NtdllDefWindowProc_A,0_2_100048E0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10005900 IsWindowEnabled,EnableWindow,NtdllDefWindowProc_A,0_2_10005900
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10005940 GetCursorPos,GetWindowRect,PtInRect,PtInRect,PtInRect,PtInRect,PtInRect,KillTimer,NtdllDefWindowProc_A,0_2_10005940
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000DA90 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000DA90
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10012AD0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10012AD0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10020B70 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10020B70
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000CBC0 GetPropA,NtdllDefWindowProc_A,0_2_1000CBC0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10004BD0 NtdllDefWindowProc_A,0_2_10004BD0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10012BF0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10012BF0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10008CB0 GetPropA,NtdllDefWindowProc_A,0_2_10008CB0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10008D40 GetPropA,RemovePropA,CallWindowProcA,NtdllDefWindowProc_A,0_2_10008D40
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000FD50 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_1000FD50
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1001FD50 GetPropA,GetPropA,NtdllDefWindowProc_A,FindWindowExA,GetPropA,GetWindowRect,0_2_1001FD50
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10013DA0 GetPropA,NtdllDefWindowProc_A,CallWindowProcA,0_2_10013DA0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10002E40 NtdllDefWindowProc_A,0_2_10002E40
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10014EA0 GetPropA,NtdllDefWindowProc_A,0_2_10014EA0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1001FEA0 GetPropA,NtdllDefWindowProc_A,InvalidateRect,CallWindowProcA,0_2_1001FEA0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00697B510_2_00697B51
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005E00300_2_005E0030
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005EB3000_2_005EB300
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005413CE0_2_005413CE
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006843A00_2_006843A0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005C14500_2_005C1450
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006094800_2_00609480
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_0068C5360_2_0068C536
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006705100_2_00670510
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006905EA0_2_006905EA
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006655A00_2_006655A0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005FE6800_2_005FE680
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005C36B00_2_005C36B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005E88A00_2_005E88A0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00539A7D0_2_00539A7D
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100175400_2_10017540
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100039700_2_10003970
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100022500_2_10002250
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100293A10_2_100293A1
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000B6E00_2_1000B6E0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10028B990_2_10028B99
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10017BA00_2_10017BA0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_1000EDA00_2_1000EDA0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: String function: 004010F2 appears 138 times
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: String function: 00685E68 appears 73 times
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: String function: 100260E2 appears 34 times
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: String function: 00401156 appears 99 times
Source: d3r1KVj317.exe, 00000000.00000000.1468315195.000000000078B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs d3r1KVj317.exe
Source: d3r1KVj317.exe, 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs d3r1KVj317.exe
Source: d3r1KVj317.exeBinary or memory string: OriginalFilenameSkinH_EL.dll vs d3r1KVj317.exe
Source: d3r1KVj317.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/2@0/1
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006A3073 CoCreateInstance,CoCreateInstance,CoCreateInstance,OleRun,0_2_006A3073
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00696385 __EH_prolog,FindResourceA,LoadResource,LockResource,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,0_2_00696385
Source: C:\Users\user\Desktop\d3r1KVj317.exeFile created: C:\Users\user\Desktop\SkinH_EL.dllJump to behavior
Source: d3r1KVj317.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\d3r1KVj317.exeFile read: C:\Users\user\Desktop\Config.iniJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: d3r1KVj317.exeReversingLabs: Detection: 57%
Source: C:\Users\user\Desktop\d3r1KVj317.exeFile read: C:\Users\user\Desktop\d3r1KVj317.exeJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeFile written: C:\Users\user\Desktop\Config.iniJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeWindow found: window name: SysTabControl32Jump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeWindow detected: Number of UI elements: 144
Source: d3r1KVj317.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: d3r1KVj317.exeStatic file information: File size 5066752 > 1048576
Source: d3r1KVj317.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2ad000
Source: d3r1KVj317.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x1e5000
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005DF2B0 GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,FreeLibrary,FreeLibrary,0_2_005DF2B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00404291 push eax; retf 005Bh0_2_00404292
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_004033A9 push eax; retf 005Bh0_2_004033AA
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_0040344E push eax; retf 005Bh0_2_0040344F
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00403487 push eax; retf 005Bh0_2_00403488
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_006836F0 push eax; ret 0_2_0068371E
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00406756 push eax; retf 005Bh0_2_00406757
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00404960 push eax; retf 005Bh0_2_00404961
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00404927 push eax; retf 005Bh0_2_00404928
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00404DD6 push ss; ret 0_2_00404DD9
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00685E68 push eax; ret 0_2_00685E86
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10026100 push eax; ret 0_2_1002612E
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100209F7 pushfd ; mov dword ptr [esp], edx0_2_100209F9
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\d3r1KVj317.exeFile created: C:\Users\user\Desktop\SkinH_EL.dllJump to dropped file
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_0067D2A3 IsIconic,GetWindowPlacement,GetWindowRect,0_2_0067D2A3
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10004E30 IsWindowVisible,GetWindowRect,SelectObject,SelectObject,SetBkMode,SelectObject,SetTextColor,DrawIconEx,GetWindowTextA,DrawTextA,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,SelectObject,DeleteDC,SelectObject,DeleteObject,0_2_10004E30
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10006010 IsWindowEnabled,SendMessageA,SendMessageA,GetWindowRect,IsRectEmpty,PtInRect,PtInRect,GetSystemMenu,GetMenuState,SendMessageA,NtdllDefWindowProc_A,PtInRect,IsIconic,PtInRect,IsZoomed,PtInRect,PtInRect,GetWindowRect,0_2_10006010
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10023070 IsWindowVisible,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,IsRectEmpty,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsZoomed,IsRectEmpty,0_2_10023070
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10023070 IsWindowVisible,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsRectEmpty,IsZoomed,IsRectEmpty,GetSystemMenu,GetMenuState,IsRectEmpty,SetBkMode,IsRectEmpty,IsRectEmpty,IsRectEmpty,IsIconic,IsRectEmpty,IsZoomed,IsRectEmpty,0_2_10023070
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10025780 IsIconic,IsZoomed,IsRectEmpty,IsWindowVisible,0_2_10025780
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_10021800 IsZoomed,SendMessageA,IsIconic,SendMessageA,SendMessageA,GetSystemMenu,GetMenuState,SendMessageA,SendMessageA,KillTimer,GetMenuItemID,SendMessageA,CallWindowProcA,0_2_10021800
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_100098B0 GetPropA,NtdllDefWindowProc_A,KillTimer,IsWindowVisible,IsIconic,SetTimer,0_2_100098B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeDropped PE file which has not been started: C:\Users\user\Desktop\SkinH_EL.dllJump to dropped file
Source: C:\Users\user\Desktop\d3r1KVj317.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-81209
Source: C:\Users\user\Desktop\d3r1KVj317.exeAPI coverage: 8.5 %
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00695CBB __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,0_2_00695CBB
Source: d3r1KVj317.exe, 00000000.00000002.2729506189.0000000000BFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllf
Source: C:\Users\user\Desktop\d3r1KVj317.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005DF2B0 GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,FreeLibrary,FreeLibrary,0_2_005DF2B0
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_005C4160 GetProcessHeap,RtlAllocateHeap,0_2_005C4160
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00685820 GetLocalTime,GetSystemTime,GetTimeZoneInformation,0_2_00685820
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_0068F4DC GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0068F4DC
Source: C:\Users\user\Desktop\d3r1KVj317.exeCode function: 0_2_00697B51 __EH_prolog,GetVersion,0_2_00697B51
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
1
Input Capture
2
System Time Discovery
Remote Services1
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)21
Obfuscated Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets3
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
d3r1KVj317.exe58%ReversingLabsWin32.Infostealer.Tinba
d3r1KVj317.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\SkinH_EL.dll5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://112.74.185.5/3R%E6%8A%80%E6%9C%AF.exed3r1KVj317.exefalse
    unknown
    http://www.eyuyan.com)DVarFileInfo$d3r1KVj317.exefalse
      unknown
      http://api.ttshitu.com/predictd3r1KVj317.exefalse
        unknown
        http://api.ttshitu.com/predictto16unfunctiond3r1KVj317.exefalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          112.74.185.5
          unknownChina
          37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1520465
          Start date and time:2024-09-27 11:28:46 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 45s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:d3r1KVj317.exe
          renamed because original name is a hash value
          Original Sample Name:d5062f9d7dcb69516a2d2af3fb5a0c8d.exe
          Detection:MAL
          Classification:mal56.winEXE@1/2@0/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 60%
          • Number of executed functions: 73
          • Number of non-executed functions: 248
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • VT rate limit hit for: d3r1KVj317.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          112.74.185.5pIbH4cYnMl.exeGet hashmaliciousUnknownBrowse
          • 112.74.185.5/AMS.exe
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdhttp://aa5aa5aa5aa5aa44.app/Get hashmaliciousUnknownBrowse
          • 59.82.132.217
          http://hbyczyz.com/xrrGet hashmaliciousUnknownBrowse
          • 47.108.5.198
          http://www.tpckn.app/Get hashmaliciousUnknownBrowse
          • 203.107.62.140
          http://alibinaadi.com/.well-known/alibaba/Alibaba/index.phpGet hashmaliciousUnknownBrowse
          • 59.82.33.225
          cjg7obu8xR.exeGet hashmaliciousUnknownBrowse
          • 112.74.185.5
          cjg7obu8xR.exeGet hashmaliciousUnknownBrowse
          • 112.74.185.5
          http://promo1.spik.ru/CN/Get hashmaliciousHTMLPhisherBrowse
          • 59.82.132.149
          https://oxbike-br.com/XRpb24t/zc2liaWx/Get hashmaliciousHTMLPhisherBrowse
          • 59.82.33.225
          http://wwwhd4480.com/Get hashmaliciousUnknownBrowse
          • 106.11.43.113
          GvQcD0PvEH.exeGet hashmaliciousUnknownBrowse
          • 47.117.76.6
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\Desktop\SkinH_EL.dllwTe1JnpD30.exeGet hashmaliciousUnknownBrowse
            RCepXxJiXT.exeGet hashmaliciousUnknownBrowse
              #U8bbe#U7f6e.exeGet hashmaliciousUnknownBrowse
                #U7389#U5154#U542f#U52a8#U5668.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Win32.PUP-gen.2847.28870.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.BackDoor.BlackHole.20333.28463.12775.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.BackDoor.BlackHole.20333.28463.12775.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win32.Evo-gen.480.9036.dllGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win32.Evo-gen.480.9036.dllGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.FileRepMalware.17429.29089.exeGet hashmaliciousUnknownBrowse
                              Process:C:\Users\user\Desktop\d3r1KVj317.exe
                              File Type:ISO-8859 text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):254
                              Entropy (8bit):5.783477328385473
                              Encrypted:false
                              SSDEEP:3:pJKAKV6rFI/VCzY2lpgXiZVNXa7aftISbJuok2ubmJkPbmrvh2gtTE7bYU2/OUtG:pEAKVW82nsSVlUEqAklJb4UN7b5tUqjv
                              MD5:45FFD29B9717D7CF91EF2460E28F5811
                              SHA1:358ED2315324EFB383156349E042F860B006B334
                              SHA-256:F0001973A941E220B9C4D4042EF40E69EA4AADDE52BAECD175D40C96D2BF1CC3
                              SHA-512:107C06983AE93B368B7D5477B0E1D307E94D57CA20C6A0AC8F9BD584C643C618A162F3BE442DA77AE21795D90C145BEF3F19DF86988DD8A884F863248BC2A2AA
                              Malicious:false
                              Reputation:low
                              Preview:[Config].........=.........=........=.........=.........->...->...................................=..........................................................=........=.............................................=..
                              Process:C:\Users\user\Desktop\d3r1KVj317.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                              Category:dropped
                              Size (bytes):88576
                              Entropy (8bit):7.934132664312091
                              Encrypted:false
                              SSDEEP:1536:s5Np2dgZgIehUUS3E1Ujmrvl179D53UWnGQRJZiXRmrCnKptnouy8K:s5Np2dlUX0+Cx17F8QRJZKmOK3outK
                              MD5:147127382E001F495D1842EE7A9E7912
                              SHA1:92D1ED56032183C75D4B57D7CE30B1C4AE11DC9B
                              SHA-256:EDF679C02EA2E170E67AB20DFC18558E2BFB4EE5D59ECEEAEA4B1AD1A626C3CC
                              SHA-512:97F5AE90A1BBACFE39B9E0F2954C24F9896CC9DCA9D14364C438862996F3BBC04A4AA515742FCCB3679D222C1302F5BB40C7EADDD6B5859D2D6EF79490243A4D
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 5%
                              Joe Sandbox View:
                              • Filename: wTe1JnpD30.exe, Detection: malicious, Browse
                              • Filename: RCepXxJiXT.exe, Detection: malicious, Browse
                              • Filename: #U8bbe#U7f6e.exe, Detection: malicious, Browse
                              • Filename: #U7389#U5154#U542f#U52a8#U5668.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.PUP-gen.2847.28870.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.BackDoor.BlackHole.20333.28463.12775.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.BackDoor.BlackHole.20333.28463.12775.exe, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.Evo-gen.480.9036.dll, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.Win32.Evo-gen.480.9036.dll, Detection: malicious, Browse
                              • Filename: SecuriteInfo.com.FileRepMalware.17429.29089.exe, Detection: malicious, Browse
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........q..."..."...".."..."u."..."..."...".."..."..."Y.."u."..."%."..."u."..."Rich..."........PE..L...`..J...........!.....P.......`..p....p..................................................................................H...........H...........................................................................................................UPX0.....`..............................UPX1.....P...p...L..................@....rsrc................P..............@..............................................................................................................................................................................................................................................................................................................................................................................................................3.03.UPX!....
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.646661372611354
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.39%
                              • UPX compressed Win32 Executable (30571/9) 0.30%
                              • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              File name:d3r1KVj317.exe
                              File size:5'066'752 bytes
                              MD5:d5062f9d7dcb69516a2d2af3fb5a0c8d
                              SHA1:5991f840b94f7855262e4f85ee3bc2faf1a72a9e
                              SHA256:abf5bda7c2cf8a0f7b57b9e0abecee531818144c30d0f11a68b794cd2c3a6371
                              SHA512:4d7d926e31ea2eb75e61d2e40e09dea3944a67195b245818aa450baf8e3d9983b5e7583726a65b386566d3a8dd0abc93be2576c4467dc78abfcc9a3dd24cbe8b
                              SSDEEP:98304:ApyetVxRosZ4Y113f7MhfJBx/FqZVUzSnGYqdwkLcHHnit:ApyetVxRosZBXmjjAny
                              TLSH:04366C13E351C5F0F55400B092BA87745E79B274AC26ABB7E7A0EDF50D39A70EA2321D
                              File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$............u...u...u...j...u...j...u..8i...u...i...u..<i...u...j...u..8}...u...u..pw...j...u...S..gu...S..(u..Sj..>u..Sj...u...u...u.
                              Icon Hash:1370c6443191c913
                              Entrypoint:0x682114
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:
                              Time Stamp:0x66F534B4 [Thu Sep 26 10:17:24 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:6484a6f708fa37c8c0be3e0080079152
                              Instruction
                              push ebp
                              mov ebp, esp
                              push FFFFFFFFh
                              push 0087F2F8h
                              push 00685028h
                              mov eax, dword ptr fs:[00000000h]
                              push eax
                              mov dword ptr fs:[00000000h], esp
                              sub esp, 58h
                              push ebx
                              push esi
                              push edi
                              mov dword ptr [ebp-18h], esp
                              call dword ptr [006AE1D4h]
                              xor edx, edx
                              mov dl, ah
                              mov dword ptr [009093B4h], edx
                              mov ecx, eax
                              and ecx, 000000FFh
                              mov dword ptr [009093B0h], ecx
                              shl ecx, 08h
                              add ecx, edx
                              mov dword ptr [009093ACh], ecx
                              shr eax, 10h
                              mov dword ptr [009093A8h], eax
                              push 00000001h
                              call 00007F95585063AFh
                              pop ecx
                              test eax, eax
                              jne 00007F955850010Ah
                              push 0000001Ch
                              call 00007F95585001C8h
                              pop ecx
                              call 00007F955850615Ah
                              test eax, eax
                              jne 00007F955850010Ah
                              push 00000010h
                              call 00007F95585001B7h
                              pop ecx
                              xor esi, esi
                              mov dword ptr [ebp-04h], esi
                              call 00007F9558505F88h
                              call dword ptr [006AE3F8h]
                              mov dword ptr [0090E604h], eax
                              call 00007F9558505E46h
                              mov dword ptr [0090931Ch], eax
                              call 00007F9558505BEFh
                              call 00007F9558505B31h
                              call 00007F9558504D23h
                              mov dword ptr [ebp-30h], esi
                              lea eax, dword ptr [ebp-5Ch]
                              push eax
                              call dword ptr [006AE254h]
                              call 00007F9558505AC2h
                              mov dword ptr [ebp-64h], eax
                              test byte ptr [ebp-30h], 00000001h
                              je 00007F9558500108h
                              movzx eax, word ptr [ebp+00h]
                              Programming Language:
                              • [IMP] VS97 (5.0) SP3 link 5.10.7303
                              • [ C ] VS98 (6.0) SP6 build 8804
                              • [C++] VS98 (6.0) SP6 build 8804
                              • [C++] VS98 (6.0) build 8168
                              • [ C ] VS98 (6.0) build 8168
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x48fc980x140.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x50f0000x23b38.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x2ae0000x8e8.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x2ac90e0x2ad00002dfb899d0327e6a801389e013810c9aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x2ae0000x1e47b60x1e5000b58fbc5c04292366b79db08ae328c802False0.6536364368556701data7.059576649278061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x4930000x7b60a0x1e000afc0d678454b5e5d7499465da58b735dFalse0.2856526692708333data4.909418642025077IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x50f0000x23b380x24000472f9c590c8d2b95a062c7777213b9e2False0.3845350477430556data4.7411316564765045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              TEXTINCLUDE0x50ffd00xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                              TEXTINCLUDE0x50ffdc0x16dataChineseChina1.3636363636363635
                              TEXTINCLUDE0x50fff40x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                              RT_CURSOR0x5101480x134dataChineseChina0.5811688311688312
                              RT_CURSOR0x51027c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                              RT_CURSOR0x5103b00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                              RT_CURSOR0x5104e40xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                              RT_BITMAP0x5105980x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                              RT_BITMAP0x5107040x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                              RT_BITMAP0x51094c0x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                              RT_BITMAP0x510a900x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                              RT_BITMAP0x510be80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                              RT_BITMAP0x510d400x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                              RT_BITMAP0x510e980x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                              RT_BITMAP0x510ff00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                              RT_BITMAP0x5111480x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                              RT_BITMAP0x5112a00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                              RT_BITMAP0x5113f80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                              RT_BITMAP0x5115500x1b4Device independent bitmap graphic, 11 x 11 x 24, image size 396ChineseChina0.18577981651376146
                              RT_BITMAP0x5117040x1b4Device independent bitmap graphic, 11 x 11 x 24, image size 396ChineseChina0.11009174311926606
                              RT_BITMAP0x5118b80x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                              RT_BITMAP0x511e9c0xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                              RT_BITMAP0x511f540x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                              RT_BITMAP0x5120c00x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                              RT_ICON0x5122040x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                              RT_ICON0x5124ec0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                              RT_ICON0x5126140x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.36829268292682926
                              RT_ICON0x512c7c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.4717741935483871
                              RT_ICON0x512f640x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5844594594594594
                              RT_ICON0x51308c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.4904051172707889
                              RT_ICON0x513f340x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.605595667870036
                              RT_ICON0x5147dc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.38583815028901736
                              RT_ICON0x514d440x71cdPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9972539731575876
                              RT_ICON0x51bf140x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.15263811664497812
                              RT_ICON0x52c73c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.2765560165975104
                              RT_ICON0x52ece40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.33606941838649157
                              RT_ICON0x52fd8c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.4698581560283688
                              RT_MENU0x5301f40xcdataChineseChina1.5
                              RT_MENU0x5302000x284dataChineseChina0.5
                              RT_DIALOG0x5304840x20dataChineseChina0.84375
                              RT_DIALOG0x5304a40x102dataChineseChina0.751937984496124
                              RT_DIALOG0x5305a80x1aadataChineseChina0.4859154929577465
                              RT_DIALOG0x5307540x41edataChineseChina0.349146110056926
                              RT_DIALOG0x530b740x98dataChineseChina0.7171052631578947
                              RT_DIALOG0x530c0c0x17adataChineseChina0.5185185185185185
                              RT_DIALOG0x530d880xfadataChineseChina0.696
                              RT_DIALOG0x530e840xeadataChineseChina0.6239316239316239
                              RT_DIALOG0x530f700x8aedataChineseChina0.39603960396039606
                              RT_DIALOG0x5318200xb2dataChineseChina0.7359550561797753
                              RT_DIALOG0x5318d40xccdataChineseChina0.7647058823529411
                              RT_DIALOG0x5319a00xb2dataChineseChina0.6629213483146067
                              RT_DIALOG0x531a540xe2dataChineseChina0.6637168141592921
                              RT_DIALOG0x531b380x18cdataChineseChina0.5227272727272727
                              RT_STRING0x531cc40x70dataChineseChina0.45535714285714285
                              RT_STRING0x531d340x50dataChineseChina0.85
                              RT_STRING0x531d840x2cdataChineseChina0.5909090909090909
                              RT_STRING0x531db00x78dataChineseChina0.925
                              RT_STRING0x531e280x1c4dataChineseChina0.8141592920353983
                              RT_STRING0x531fec0x12adataChineseChina0.5201342281879194
                              RT_STRING0x5321180x146dataChineseChina0.6288343558282209
                              RT_STRING0x5322600x40dataChineseChina0.65625
                              RT_STRING0x5322a00x64dataChineseChina0.73
                              RT_STRING0x5323040x1d8dataChineseChina0.6758474576271186
                              RT_STRING0x5324dc0x114dataChineseChina0.6376811594202898
                              RT_STRING0x5325f00x24dataChineseChina0.4444444444444444
                              RT_GROUP_CURSOR0x5326140x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                              RT_GROUP_CURSOR0x5326280x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                              RT_GROUP_CURSOR0x53263c0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                              RT_GROUP_ICON0x5326600xa0data0.6375
                              RT_GROUP_ICON0x5327000x14dataChineseChina1.2
                              RT_GROUP_ICON0x5327140x14dataChineseChina1.25
                              RT_VERSION0x5327280x240dataChineseChina0.5746527777777778
                              RT_MANIFEST0x5329680x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                              DLLImport
                              RASAPI32.dllRasHangUpA, RasGetConnectStatusA
                              WINMM.dllmidiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutRestart, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, midiStreamStop, midiOutReset, midiStreamClose, midiStreamRestart, waveOutGetNumDevs
                              WS2_32.dllselect, recv, connect, ioctlsocket, recvfrom, send, closesocket, WSAAsyncSelect, htons, ntohl, accept, getpeername, WSACleanup, socket, WSAStartup, gethostbyname, inet_ntoa, inet_addr
                              KERNEL32.dllGetWindowsDirectoryA, GetSystemDirectoryA, GetVersion, OpenProcess, CreateMutexA, ReleaseMutex, SuspendThread, GetStringTypeW, GetStringTypeA, SetUnhandledExceptionFilter, IsBadWritePtr, VirtualAlloc, LCMapStringW, LCMapStringA, SetEnvironmentVariableA, VirtualFree, HeapCreate, HeapDestroy, GetEnvironmentVariableA, GetStdHandle, SetHandleCount, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, FreeEnvironmentStringsA, UnhandledExceptionFilter, GetFileType, SetStdHandle, GetACP, HeapSize, RaiseException, GetLocalTime, GetSystemTime, RtlUnwind, GetStartupInfoA, GetOEMCP, GetCPInfo, GetProcessVersion, SetErrorMode, GetProfileIntA, GlobalFlags, GetCurrentThread, GetFileTime, TlsGetValue, LocalReAlloc, TlsSetValue, TlsFree, GlobalHandle, TlsAlloc, LocalAlloc, lstrcmpA, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, lstrcmpiA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, DuplicateHandle, lstrcpynA, FileTimeToLocalFileTime, FormatMessageA, LocalFree, InterlockedDecrement, InterlockedIncrement, TerminateProcess, GetCurrentProcess, GetFileSize, SetFilePointer, CreateToolhelp32Snapshot, Process32First, Process32Next, FileTimeToSystemTime, SetLastError, GetTimeZoneInformation, TerminateThread, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, MultiByteToWideChar, WideCharToMultiByte, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, SetFileAttributesA, GetFileAttributesA, DeleteFileA, CopyFileA, CreateDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, GetCommandLineA, GetTickCount, CreateProcessA, WaitForSingleObject, CloseHandle, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, InterlockedExchange
                              USER32.dllFindWindowA, GetWindowThreadProcessId, GetClassNameA, GetDesktopWindow, FrameRect, GetDoubleClickTime, GetCursor, ClipCursor, GrayStringA, DrawTextA, TabbedTextOutA, SetWindowTextA, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, CreateIconFromResource, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSysColorBrush, LoadStringA, wvsprintfA, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, IsDialogMessageA, ScrollWindowEx, GetDlgItem, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, IntersectRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, InvertRect, IsRectEmpty, ScrollDC, ReleaseDC, IsChild, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBeep, MessageBoxA, GetCursorPos, GetSystemMetrics, IsClipboardFormatAvailable, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, WaitForInputIdle, GetWindowTextA, UnregisterClassA, GetForegroundWindow, GetWindowTextLengthA, CharUpperA, GetWindowDC, BeginPaint, EndPaint, DestroyWindow, CreateDialogIndirectParamA, EndDialog, GetNextDlgTabItem, GetWindowPlacement, RegisterWindowMessageA, GetLastActivePopup, GetMessageTime, RemovePropA, CallWindowProcA, GetPropA, UnhookWindowsHookEx, SetPropA, GetClassLongA, CallNextHookEx, SetWindowsHookExA, CreateWindowExA, GetMenuItemID, GetMenuItemCount, RegisterClassA, GetScrollPos, ShowScrollBar, SetScrollInfo, GetScrollInfo, ScrollWindow
                              GDI32.dllExtSelectClipRgn, EndPath, PathToRegion, CreateEllipticRgn, CopyMetaFileA, GetViewportExtEx, CreateRoundRectRgn, GetTextColor, GetBkMode, GetBkColor, GetROP2, GetPolyFillMode, CreateCompatibleBitmap, CreateDCA, CreateBrushIndirect, CreateHatchBrush, CreateBitmap, CreatePatternBrush, SelectObject, CreatePen, PatBlt, CombineRgn, CreateRectRgn, FillRgn, CreateSolidBrush, CreateFontIndirectA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, CreateCompatibleDC, SetPixelV, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, Pie, Chord, Arc, Polygon, GetTextExtentPoint32A, GetDeviceCaps, SelectPalette, StretchBlt, CreatePalette, GetSystemPaletteEntries, CreateDIBitmap, DeleteObject, SelectClipRgn, CreatePolygonRgn, GetClipRgn, SetStretchBltMode, CreateRectRgnIndirect, SetBkColor, PtVisible, RectVisible, TextOutA, ExtTextOutA, GetTextMetricsA, Escape, AbortDoc, CreateFontA, SetBrushOrgEx, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, GetDIBits, ExcludeClipRect, MoveToEx, GetStretchBltMode, LineTo, GetClipBox, ScaleWindowExtEx, SetWindowExtEx, OffsetWindowOrgEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, SetTextColor, SetROP2, SetPolyFillMode, SetBkMode, RestoreDC, SaveDC, RealizePalette
                              WINSPOOL.DRVDocumentPropertiesA, OpenPrinterA, ClosePrinter
                              ADVAPI32.dllRegCloseKey, RegQueryValueExA, RegOpenKeyExA, RegSetValueExA, RegCreateKeyA, RegQueryValueA, RegCreateKeyExA
                              SHELL32.dllSHGetSpecialFolderPathA, Shell_NotifyIconA, ShellExecuteA
                              ole32.dllCoTaskMemAlloc, OleDuplicateData, RevokeDragDrop, CoLockObjectExternal, DoDragDrop, OleGetClipboard, OleFlushClipboard, OleRun, CoCreateInstance, CreateStreamOnHGlobal, CLSIDFromString, OleUninitialize, OleInitialize, OleSetClipboard, CoTaskMemFree, ReleaseStgMedium, CLSIDFromProgID, OleIsCurrentClipboard
                              OLEAUT32.dllSafeArrayGetElement, SysFreeString, SysStringLen, VarDateFromStr, UnRegisterTypeLib, GetActiveObject, LoadTypeLib, LHashValOfNameSys, RegisterTypeLib, SafeArrayPutElement, SafeArrayCreate, SafeArrayDestroy, SysAllocString, VariantInit, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayGetDim, SafeArrayGetLBound, SafeArrayGetUBound, VariantChangeType, VariantClear, VariantCopy, VariantCopyInd
                              ODBC32.dll
                              COMCTL32.dllImageList_AddMasked, ImageList_Draw, ImageList_Destroy, ImageList_Create, ImageList_Read, ImageList_SetBkColor, ImageList_GetImageCount, ImageList_GetImageInfo, ImageList_Duplicate
                              WININET.dllInternetCloseHandle
                              comdlg32.dllGetOpenFileNameA, ChooseColorA, ChooseFontA, GetFileTitleA, GetSaveFileNameA, PrintDlgA
                              Language of compilation systemCountry where language is spokenMap
                              ChineseChina
                              TimestampSource PortDest PortSource IPDest IP
                              Sep 27, 2024 11:29:49.011063099 CEST497048099192.168.2.8112.74.185.5
                              Sep 27, 2024 11:29:49.016021013 CEST809949704112.74.185.5192.168.2.8
                              Sep 27, 2024 11:29:49.016109943 CEST497048099192.168.2.8112.74.185.5
                              Sep 27, 2024 11:29:49.016779900 CEST497048099192.168.2.8112.74.185.5
                              Sep 27, 2024 11:29:49.021960974 CEST809949704112.74.185.5192.168.2.8
                              Sep 27, 2024 11:29:49.934381962 CEST809949704112.74.185.5192.168.2.8
                              Sep 27, 2024 11:29:49.983678102 CEST497048099192.168.2.8112.74.185.5

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:05:29:46
                              Start date:27/09/2024
                              Path:C:\Users\user\Desktop\d3r1KVj317.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\d3r1KVj317.exe"
                              Imagebase:0x400000
                              File size:5'066'752 bytes
                              MD5 hash:D5062F9D7DCB69516A2D2AF3FB5A0C8D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:2.5%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:22.9%
                                Total number of Nodes:1848
                                Total number of Limit Nodes:102
                                execution_graph 80162 1001c400 80165 1001c450 GetPropA 80162->80165 80166 1001c485 GetPropA 80165->80166 80167 1001c46b RemovePropA SendMessageA 80165->80167 80168 1001c491 IsWindowVisible 80166->80168 80169 1001c40b EnumChildWindows 80166->80169 80167->80166 80168->80169 80171 1001c4b9 InvalidateRect SetWindowPos 80168->80171 80171->80169 80172 1001dd00 GetClientRect 80173 1001dd29 11 API calls 80172->80173 80175 1001de28 80173->80175 80216 10012060 GetPropA 80175->80216 80178 1001de5a CreateFontIndirectA SelectObject SendMessageA SendMessageA 80180 1001e019 80178->80180 80181 1001deda 80178->80181 80183 1001e021 80180->80183 80184 1001e27a SetRectEmpty 80180->80184 80182 1001e4a4 SelectObject DeleteDC DeleteObject DeleteObject 80181->80182 80194 1001dee4 80181->80194 80186 1001e152 80183->80186 80187 1001e02d SetRectEmpty SendMessageA 80183->80187 80188 1001e3a7 80184->80188 80189 1001e29b SetRectEmpty SendMessageA 80184->80189 80185 1001deea SetRectEmpty SendMessageA 80185->80194 80195 1000b6e0 6 API calls 80186->80195 80192 1001e05d 80187->80192 80193 1000b6e0 6 API calls 80188->80193 80204 1001e2cb 80189->80204 80191 1001e014 80191->80182 80192->80186 80192->80187 80198 1000b6e0 6 API calls 80192->80198 80205 1001e500 16 API calls 80192->80205 80196 1001e3d5 IsRectEmpty 80193->80196 80194->80185 80194->80191 80220 1000b6e0 80194->80220 80261 1001e500 SendMessageA 80194->80261 80197 1001e182 IsRectEmpty 80195->80197 80196->80182 80199 1001e3eb InflateRect 80196->80199 80197->80182 80202 1001e198 InflateRect 80197->80202 80198->80192 80210 1001e406 80199->80210 80200 1000b6e0 6 API calls 80200->80204 80203 1001e1b3 80202->80203 80208 1001e23a 80203->80208 80209 1001e1fa 80203->80209 80204->80188 80204->80189 80204->80200 80206 1001e500 16 API calls 80204->80206 80205->80192 80206->80204 80212 1000b6e0 6 API calls 80208->80212 80211 1000b6e0 6 API calls 80209->80211 80214 1000b6e0 6 API calls 80210->80214 80213 1001e20c 80211->80213 80212->80213 80215 1001e500 16 API calls 80213->80215 80214->80213 80215->80182 80217 1001209a GetObjectA 80216->80217 80218 10012076 80216->80218 80217->80178 80218->80217 80219 10012088 SendMessageA 80218->80219 80219->80217 80221 1000b6f6 80220->80221 80260 1000bfd7 80220->80260 80247 1000bb3f 80221->80247 80221->80260 80273 1000b4c0 80221->80273 80223 1000b754 80224 1000b7a6 80223->80224 80225 1000b76a 80223->80225 80227 1000b4c0 5 API calls 80224->80227 80281 1000b2e0 74001530 SelectObject 74001530 DeleteObject DeleteDC 80225->80281 80228 1000b7a1 80227->80228 80229 1000b4c0 5 API calls 80228->80229 80230 1000b80f 80229->80230 80231 1000b830 80230->80231 80232 1000b86c 80230->80232 80282 1000b2e0 74001530 SelectObject 74001530 DeleteObject DeleteDC 80231->80282 80233 1000b4c0 5 API calls 80232->80233 80235 1000b867 80233->80235 80236 1000b925 80235->80236 80237 1000b8c6 80235->80237 80239 1000b4c0 5 API calls 80236->80239 80283 1000b2e0 74001530 SelectObject 74001530 DeleteObject DeleteDC 80237->80283 80240 1000b920 80239->80240 80241 1000b9a2 80240->80241 80242 1000b9eb 80240->80242 80284 1000b2e0 74001530 SelectObject 74001530 DeleteObject DeleteDC 80241->80284 80244 1000b4c0 5 API calls 80242->80244 80245 1000b9e6 80244->80245 80246 1000b4c0 5 API calls 80245->80246 80248 1000ba60 80246->80248 80254 1000bf52 OffsetRect 80247->80254 80255 1000bf17 80247->80255 80247->80260 80249 1000bac2 80248->80249 80250 1000ba79 80248->80250 80252 1000b4c0 5 API calls 80249->80252 80285 1000b2e0 74001530 SelectObject 74001530 DeleteObject DeleteDC 80250->80285 80253 1000babd 80252->80253 80258 1000b4c0 5 API calls 80253->80258 80257 1000b4c0 5 API calls 80254->80257 80256 1000b4c0 5 API calls 80255->80256 80259 1000bf47 80256->80259 80257->80260 80258->80247 80259->80194 80260->80194 80262 1001e560 InflateRect 80261->80262 80263 1001e77b 80261->80263 80264 1001e73a 80262->80264 80265 1001e5ae 80262->80265 80263->80194 80264->80263 80288 1000e790 10 API calls 80264->80288 80265->80264 80267 1001e6ba 80265->80267 80268 1001e5dc 80265->80268 80287 1000e8a0 6 API calls 80267->80287 80286 1000e930 9 API calls 80268->80286 80271 1001e6fc 6FA9CFD0 80271->80194 80272 1001e664 6FA9CFD0 80272->80264 80275 1000b4c8 80273->80275 80274 1000b5dc 80274->80223 80275->80274 80276 1000b542 SelectObject 80275->80276 80277 1000b515 74001530 80275->80277 80279 100271c4 80276->80279 80277->80223 80280 1000b5a1 74001530 DeleteObject DeleteDC 80279->80280 80280->80223 80281->80228 80282->80235 80283->80240 80284->80245 80285->80253 80286->80272 80287->80271 80288->80263 80289 10017540 80290 1001756c 80289->80290 80291 100175a7 80289->80291 80290->80291 80292 100175e3 ??2@YAPAXI 80290->80292 80293 100175ff 80292->80293 80294 10017621 80293->80294 80295 10017606 ??3@YAXPAX 80293->80295 80296 10017694 ??3@YAXPAX 80294->80296 80297 100176af 80294->80297 80299 10017700 80294->80299 80295->80291 80298 100176e5 ??3@YAXPAX 80297->80298 80297->80299 80314 10006b30 DeleteObject 80299->80314 80301 10017a12 80302 10017a1a ??3@YAXPAX 80301->80302 80303 10017acc ??3@YAXPAX SelectObject 80301->80303 80304 10017b04 SelectObject 80303->80304 80305 10017af6 DeleteObject 80303->80305 80307 10017b51 SelectObject 80304->80307 80305->80304 80315 10018e00 8 API calls 80307->80315 80309 10017b62 80316 10018f60 16 API calls 80309->80316 80311 10017b69 80317 100191c0 SelectObject DeleteDC DeleteObject 80311->80317 80313 10017b75 80314->80301 80315->80309 80316->80311 80317->80313 80318 10014f80 80319 10014f92 80318->80319 80320 1001503f 80318->80320 80321 100150ee 80319->80321 80324 10015123 CallWindowProcA 80319->80324 80328 100150ab 80319->80328 80330 10014fe7 80319->80330 80331 10015106 80319->80331 80332 10014fb6 80319->80332 80333 10014fcb 80319->80333 80334 1001502a 80319->80334 80335 10014ffc CallWindowProcA 80319->80335 80336 1001507f 80319->80336 80322 100150c1 80320->80322 80323 10015046 80320->80323 80394 10016060 78 API calls 80321->80394 80325 100150c8 80322->80325 80326 1001511c 80322->80326 80327 10015048 80323->80327 80323->80328 80325->80331 80339 100150ca 80325->80339 80326->80324 80337 10015140 80326->80337 80327->80321 80327->80324 80327->80336 80349 10015095 80327->80349 80350 10015069 80327->80350 80392 10015be0 49 API calls 80328->80392 80370 100154e0 80330->80370 80379 10015400 80331->80379 80386 10016220 GetWindowRect PtInRect PtInRect CallWindowProcA 80332->80386 80387 10012460 SendMessageA 80333->80387 80388 10012100 CallWindowProcA 80334->80388 80373 100155d0 IsWindowVisible 80335->80373 80390 100157b0 47 API calls 80336->80390 80395 10015390 IsWindowVisible IsWindowVisible 80337->80395 80339->80321 80348 100150d4 80339->80348 80340 10015102 80343 100150bd 80348->80324 80361 100150d9 80348->80361 80391 10012370 7 API calls 80349->80391 80389 100162f0 43 API calls 80350->80389 80354 10015118 80355 10015023 80356 1001503b 80357 10014fc7 80358 10015151 80360 10014fd2 80365 100155d0 41 API calls 80360->80365 80393 10014ef0 GetParent GetClassLongA SendMessageA SendMessageA CallWindowProcA 80361->80393 80362 10014ff8 80363 10015091 80364 100150a7 80368 10014fe3 80365->80368 80367 1001507b 80369 100150ea 80371 100155a8 CallWindowProcA 80370->80371 80372 100154fb 80370->80372 80371->80362 80372->80371 80374 100155e1 80373->80374 80375 100155e5 80373->80375 80374->80355 80396 10015840 IsWindowVisible 80375->80396 80377 10015605 80378 1001560f SendMessageA 80377->80378 80378->80355 80380 1001540a 80379->80380 80383 10015433 80379->80383 80381 10015415 CallWindowProcA 80380->80381 80382 100154cc 80380->80382 80381->80354 80382->80354 80384 100154b3 SetWindowPos 80383->80384 80385 10015499 CallWindowProcA 80383->80385 80384->80382 80385->80384 80386->80357 80387->80360 80388->80356 80389->80367 80390->80363 80391->80364 80392->80343 80393->80369 80394->80340 80395->80358 80397 1001586e 80396->80397 80401 10015bb3 80396->80401 80397->80401 80407 10015630 20 API calls 80397->80407 80399 100158c9 80400 100158f5 SelectObject PatBlt 80399->80400 80402 10015935 80399->80402 80400->80402 80401->80377 80402->80401 80405 1000b6e0 6 API calls 80402->80405 80408 1000fbf0 80402->80408 80415 1000fc70 SelectObject DeleteDC DeleteObject 80402->80415 80405->80402 80407->80399 80409 1000fc0f SelectObject 80408->80409 80411 1000fc60 SelectObject PatBlt 80409->80411 80412 1000fc32 CreateRectRgn GetClipRgn 80409->80412 80411->80402 80413 1000fc59 DeleteObject 80412->80413 80414 1000fc4f SelectClipRgn 80412->80414 80413->80411 80414->80413 80415->80402 80416 6972ed 80417 6972f9 80416->80417 80420 697207 80417->80420 80427 69f5f5 80420->80427 80423 69726c 80446 69fb7d 80427->80446 80430 697251 80430->80423 80432 697179 80430->80432 80433 69fb7d 21 API calls 80432->80433 80434 69718a 80433->80434 80435 6971bd CreateWindowExA 80434->80435 80436 69719b GetCurrentThreadId SetWindowsHookExA 80434->80436 80439 6971c5 80435->80439 80436->80435 80437 6971b8 80436->80437 80478 69238d RaiseException 80437->80478 80440 69fb7d 21 API calls 80439->80440 80441 6971d5 80440->80441 80442 69f5f5 28 API calls 80441->80442 80443 6971dc 80442->80443 80444 6971f4 80443->80444 80445 6971e9 UnhookWindowsHookEx 80443->80445 80444->80423 80445->80444 80447 69fbb3 TlsGetValue 80446->80447 80448 69fb86 80446->80448 80450 69fbc6 80447->80450 80452 69fba0 80448->80452 80473 69f77d RaiseException TlsAlloc InitializeCriticalSection 80448->80473 80454 69fbd9 80450->80454 80455 69f604 80450->80455 80463 69f816 EnterCriticalSection 80452->80463 80453 69fbb1 80453->80447 80474 69f985 8 API calls __startOneArgErrorHandling 80454->80474 80455->80430 80457 69fc12 80455->80457 80458 69fc1c __EH_prolog 80457->80458 80459 69fc4a 80458->80459 80476 6a0965 6 API calls 80458->80476 80459->80430 80461 69fc33 80477 6a09d5 LeaveCriticalSection 80461->80477 80464 69f835 80463->80464 80466 69f86f GlobalAlloc 80464->80466 80467 69f882 GlobalHandle GlobalUnlock GlobalReAlloc 80464->80467 80472 69f8f1 __startOneArgErrorHandling 80464->80472 80465 69f906 LeaveCriticalSection 80465->80453 80468 69f8a4 80466->80468 80467->80468 80469 69f8cd GlobalLock 80468->80469 80470 69f8b2 GlobalHandle GlobalLock LeaveCriticalSection 80468->80470 80469->80472 80475 69238d RaiseException 80470->80475 80472->80465 80473->80452 80474->80455 80476->80461 80477->80459 80479 69c16f 80480 69c17f 80479->80480 80484 69c17b 80479->80484 80485 69c0e8 80480->80485 80482 69c186 80493 694c0a 80482->80493 80486 69c0f2 __EH_prolog 80485->80486 80499 69f61b 80486->80499 80488 69c0f8 80491 69c136 80488->80491 80504 694f44 29 API calls _wctomb_s 80488->80504 80490 69c11a 80490->80491 80505 69aec6 29 API calls __EH_prolog 80490->80505 80491->80482 80494 694c1e 80493->80494 80495 694c33 80494->80495 80498 694c3a 80494->80498 80506 694a84 29 API calls __startOneArgErrorHandling 80494->80506 80507 694b1d 29 API calls 80495->80507 80498->80484 80500 69f5f5 28 API calls 80499->80500 80501 69f620 80500->80501 80502 69fb7d 21 API calls 80501->80502 80503 69f631 80502->80503 80503->80488 80504->80490 80505->80491 80506->80495 80507->80498 80508 699764 80509 69976e 80508->80509 80510 69977f 80508->80510 80512 696953 80509->80512 80515 6968ea GetWindowLongA 80512->80515 80516 69690b SetWindowLongA 80515->80516 80517 696907 80515->80517 80516->80517 80518 696921 SetWindowPos 80516->80518 80517->80510 80518->80517 80519 5e3a50 80520 5e3a9b 80519->80520 80556 5c4d30 80520->80556 80522 5e3ae2 80523 5e3c54 80522->80523 80524 5e3af5 80522->80524 80525 695203 32 API calls 80523->80525 80568 695811 80524->80568 80526 5e3c63 80525->80526 80528 695203 32 API calls 80526->80528 80529 5e3c6f 80528->80529 80581 5c4340 GetProcessHeap HeapFree 80529->80581 80531 5e3c83 80582 5c4340 GetProcessHeap HeapFree 80531->80582 80533 5e3c92 80583 5c4340 GetProcessHeap HeapFree 80533->80583 80535 5e3b00 80538 5e3b51 GlobalUnlock GlobalReAlloc 80535->80538 80536 5e3ca7 80537 695203 32 API calls 80536->80537 80539 5e3cb9 80537->80539 80571 69ec59 39 API calls __EH_prolog 80538->80571 80541 5e3b72 80572 69584f 23 API calls 80541->80572 80543 5e3b7b 80573 695203 80543->80573 80546 695203 32 API calls 80547 5e3b96 80546->80547 80578 5c4340 GetProcessHeap HeapFree 80547->80578 80549 5e3baa 80579 5c4340 GetProcessHeap HeapFree 80549->80579 80551 5e3bb9 80580 5c4340 GetProcessHeap HeapFree 80551->80580 80553 5e3bce 80554 695203 32 API calls 80553->80554 80555 5e3be0 80554->80555 80557 5c4d51 80556->80557 80558 5c4dfd 80557->80558 80584 69c4d3 80557->80584 80558->80522 80561 5c4dc0 80604 69c5af 32 API calls __EH_prolog 80561->80604 80563 5c4dd3 80605 69d2ae 39 API calls __EH_prolog 80563->80605 80565 5c4de7 80565->80522 80618 695827 GetLastError 80568->80618 80570 69581d 80570->80535 80571->80541 80572->80543 80574 5e3b8a 80573->80574 80575 695213 InterlockedDecrement 80573->80575 80574->80546 80575->80574 80576 695221 80575->80576 80621 6950f2 31 API calls 80576->80621 80578->80549 80579->80551 80580->80553 80581->80531 80582->80533 80583->80536 80586 69c4dd __EH_prolog 80584->80586 80585 5c4dac 80588 695070 80585->80588 80595 5c4160 80585->80595 80586->80585 80606 694f44 29 API calls _wctomb_s 80586->80606 80589 69507c 80588->80589 80591 695085 80588->80591 80589->80561 80590 69508d 80607 681f2f 80590->80607 80591->80590 80593 6950cc 80591->80593 80614 694f44 29 API calls _wctomb_s 80593->80614 80596 5c416c 80595->80596 80599 5c417c 80595->80599 80617 5c4230 7 API calls 80596->80617 80598 5c4176 80598->80561 80600 5c41ef GetProcessHeap 80599->80600 80601 5c41fa RtlAllocateHeap 80599->80601 80603 5c4184 80599->80603 80600->80601 80602 5c4211 80601->80602 80602->80561 80603->80561 80604->80563 80605->80565 80606->80585 80615 685e68 80607->80615 80609 681f39 EnterCriticalSection 80610 681f88 LeaveCriticalSection 80609->80610 80611 681f57 80609->80611 80610->80589 80616 69469e 29 API calls 80611->80616 80613 681f69 80613->80610 80613->80613 80614->80589 80615->80609 80616->80613 80617->80598 80619 69fb7d 21 API calls 80618->80619 80620 695840 SetLastError 80619->80620 80620->80570 80621->80574 80622 5e7750 80625 60a2e0 GetProcessHeap 80622->80625 80626 60a343 OleInitialize 80625->80626 80627 60a355 GetModuleFileNameA 80625->80627 80626->80627 80678 684257 80627->80678 80629 60a377 80630 60a380 80629->80630 80631 60a39b 80629->80631 80632 695340 35 API calls 80630->80632 80695 69518e 80631->80695 80634 60a397 80632->80634 80684 695340 80634->80684 80637 60a3dd 80638 60a411 LoadCursorA GetStockObject 80637->80638 80689 5e9620 80638->80689 80641 697207 32 API calls 80642 60a461 GetCurrentThreadId 80641->80642 80643 60a476 80642->80643 80648 60a4ea 80643->80648 80699 5c48b0 7 API calls 80643->80699 80645 5e775d 80646 60a4bb 80700 5c48b0 7 API calls 80646->80700 80652 60a5af 80648->80652 80703 5c48b0 7 API calls 80648->80703 80650 60a4c9 80701 5c48b0 7 API calls 80650->80701 80651 60a596 80704 5c48b0 7 API calls 80651->80704 80652->80645 80655 695811 23 API calls 80652->80655 80658 60a5db 80655->80658 80656 60a4d9 80702 5c48b0 7 API calls 80656->80702 80659 69c4d3 29 API calls 80658->80659 80660 60a61e 80659->80660 80705 5dbee0 46 API calls 80660->80705 80662 60a631 80706 69c5af 32 API calls __EH_prolog 80662->80706 80664 60a64a 80707 69d2ae 39 API calls __EH_prolog 80664->80707 80666 60a656 80708 69584f 23 API calls 80666->80708 80669 60a77c 80710 5c4340 GetProcessHeap HeapFree 80669->80710 80671 60a784 80711 5dbe20 64 API calls 80671->80711 80673 60a79a 80712 5c4340 GetProcessHeap HeapFree 80673->80712 80675 60a7fe 80713 5c4340 GetProcessHeap HeapFree 80675->80713 80677 60a65e 80709 5db4a0 7 API calls 80677->80709 80679 684274 80678->80679 80681 684265 80678->80681 80714 68aae4 80679->80714 80681->80629 80682 68427c 80729 68ab45 LeaveCriticalSection 80682->80729 80685 69534c 80684->80685 80686 695350 lstrlenA 80684->80686 80762 6952c3 80685->80762 80686->80685 80688 60a3ba SetCurrentDirectoryA 80688->80637 80690 69f5f5 28 API calls 80689->80690 80691 5e962a GetClassInfoA 80690->80691 80692 5e968a 80691->80692 80693 5e9642 80691->80693 80692->80641 80772 69784a 32 API calls __EH_prolog 80693->80772 80696 6951ab 80695->80696 80697 695196 80695->80697 80696->80634 80698 695340 35 API calls 80697->80698 80698->80696 80699->80646 80700->80650 80701->80656 80702->80648 80703->80651 80704->80652 80705->80662 80706->80664 80707->80666 80708->80677 80709->80669 80710->80671 80711->80673 80712->80675 80713->80645 80715 68ab3a EnterCriticalSection 80714->80715 80716 68aafc 80714->80716 80715->80682 80730 6839f7 80716->80730 80719 68ab12 80721 68aae4 _wctomb_s 27 API calls 80719->80721 80722 68ab1a 80721->80722 80723 68ab2b 80722->80723 80724 68ab21 InitializeCriticalSection 80722->80724 80734 68390e 29 API calls _wctomb_s 80723->80734 80726 68ab30 80724->80726 80735 68ab45 LeaveCriticalSection 80726->80735 80728 68ab38 80728->80715 80729->80681 80736 683a09 80730->80736 80733 68221c 7 API calls _wctomb_s 80733->80719 80734->80726 80735->80728 80737 683a06 80736->80737 80739 683a10 _wctomb_s 80736->80739 80737->80719 80737->80733 80739->80737 80740 683a35 80739->80740 80741 683a62 80740->80741 80743 683aa5 80740->80743 80742 68aae4 _wctomb_s 28 API calls 80741->80742 80746 683a90 80741->80746 80744 683a78 80742->80744 80743->80746 80747 683ac7 80743->80747 80758 68c081 5 API calls __startOneArgErrorHandling 80744->80758 80745 683b14 RtlAllocateHeap 80749 683a97 80745->80749 80746->80745 80746->80749 80750 68aae4 _wctomb_s 28 API calls 80747->80750 80749->80739 80752 683ace 80750->80752 80751 683a83 80759 683a9c LeaveCriticalSection _wctomb_s 80751->80759 80760 68cb24 6 API calls __startOneArgErrorHandling 80752->80760 80755 683ae1 80761 683afb LeaveCriticalSection _wctomb_s 80755->80761 80757 683aee 80757->80746 80757->80749 80758->80751 80759->80746 80760->80755 80761->80757 80765 6951da 80762->80765 80764 6952d1 _wctomb_s 80764->80688 80766 6951ea 80765->80766 80767 6951fe 80766->80767 80771 69513a 32 API calls 80766->80771 80767->80764 80769 6951f6 80770 695070 31 API calls 80769->80770 80770->80767 80771->80769 80772->80692 80773 1000d410 80774 1000d430 GetWindowRect OffsetRect 80773->80774 80775 1000d425 80773->80775 80825 1000c1c0 GetWindowRect CreateRectRgn FindWindowExA 80774->80825 80775->80774 80778 1000d482 80779 1000d4e7 GetWindowTextA 80778->80779 80780 1000d48c GetPropA 80778->80780 80781 1000d533 SendMessageA 80779->80781 80782 1000d6ab 80779->80782 80783 1000d4b9 SelectObject PatBlt 80780->80783 80784 1000d49f 80780->80784 80787 1000da00 IsWindowEnabled 80781->80787 80788 1000d550 GetIconInfo GetObjectA 80781->80788 80785 1000d811 80782->80785 80786 1000d6b6 SendMessageA 80782->80786 80783->80779 80831 1000b0c0 CreateSolidBrush SelectObject PatBlt SelectObject DeleteObject 80784->80831 80792 1000d9fb 80785->80792 80796 10012060 2 API calls 80785->80796 80786->80787 80791 1000d6d5 GetObjectA 80786->80791 80790 1000da12 80787->80790 80795 1000d598 OffsetRect 80788->80795 80832 10007f00 16 API calls 80790->80832 80798 1000d6ea SelectObject SetRect 80791->80798 80792->80787 80793 1000d4b4 80793->80779 80800 1000d627 7 API calls 80795->80800 80801 1000d5ef IsWindowEnabled 80795->80801 80799 1000d832 SelectObject SetBkMode DrawTextA 80796->80799 80803 1000d71f OffsetRect 80798->80803 80804 1000d8a6 80799->80804 80805 1000d8b8 IsWindowEnabled 80799->80805 80800->80787 80806 1000d60c 80801->80806 80802 1000da2b 80812 1000d7b0 DeleteDC BeginPath 80803->80812 80813 1000d77b IsWindowEnabled 80803->80813 80804->80805 80807 1000d8c6 SetTextColor 80805->80807 80808 1000d8d8 GetPropA 80805->80808 80811 1000b6e0 6 API calls 80806->80811 80815 1000d915 OffsetRect 80807->80815 80808->80807 80814 1000d624 80811->80814 80812->80785 80816 1000d798 80813->80816 80814->80800 80819 1000d971 IsWindowEnabled 80815->80819 80820 1000d9ab DrawTextA BeginPath 80815->80820 80821 1000b6e0 6 API calls 80816->80821 80822 1000d98e 80819->80822 80820->80792 80821->80812 80823 1000b6e0 6 API calls 80822->80823 80824 1000d9a8 80823->80824 80824->80820 80826 1000c210 IsWindowVisible 80825->80826 80827 1000c28c SelectClipRgn DeleteObject 80825->80827 80828 1000c27a FindWindowExA 80826->80828 80829 1000c21b 80826->80829 80827->80778 80828->80826 80828->80827 80829->80828 80830 1000c227 GetWindowRect OffsetRect CreateRectRgn CombineRgn DeleteObject 80829->80830 80830->80828 80831->80793 80832->80802 80833 10013810 GetClientRect 80834 1000fbf0 5 API calls 80833->80834 80835 1001385d 80834->80835 80836 10012060 2 API calls 80835->80836 80837 10013883 SelectObject 80836->80837 80838 10013896 80837->80838 80839 100138af InflateRect InflateRect 80838->80839 80840 1001390e IsWindowEnabled 80839->80840 80841 1001391c 80839->80841 80840->80841 80842 1000b6e0 6 API calls 80841->80842 80843 10013a56 80842->80843 80844 10013a87 GetWindowTextA 80843->80844 80845 10013a61 80843->80845 80844->80845 80846 10013abc 80844->80846 80854 1000fc70 SelectObject DeleteDC DeleteObject 80845->80854 80847 10013af7 DrawTextA 80846->80847 80850 10013b4c GetPropA 80846->80850 80847->80850 80852 10013bf4 SetTextColor SetBkMode DrawTextA 80850->80852 80853 10013bde 80850->80853 80851 10013c70 80852->80845 80853->80852 80854->80851 80855 10019818 ??2@YAPAXI 80856 10019832 80855->80856 80862 10012140 SetPropA 80856->80862 80858 10019858 80859 10019ef8 ??2@YAPAXI 80858->80859 80860 10019f7d 80858->80860 80861 10019f20 80859->80861 80863 1001216a 80862->80863 80863->80858 80864 10026218 80865 1002622b 80864->80865 80869 10026234 80864->80869 80866 1002625c 80865->80866 80874 10025d80 80865->80874 80869->80865 80869->80866 80881 1002616d 80869->80881 80870 10026268 80870->80866 80871 1002627c 80870->80871 80872 1002616d 3 API calls 80870->80872 80871->80866 80873 1002616d 3 API calls 80871->80873 80872->80871 80873->80866 80875 10025d89 80874->80875 80876 10025d9e 80874->80876 80877 10025da3 80875->80877 80888 10025d00 80875->80888 80893 10025d50 56 API calls 80876->80893 80877->80870 80882 10026175 80881->80882 80883 100261ab 80882->80883 80884 10026196 malloc 80882->80884 80886 100261d5 80882->80886 80883->80865 80884->80883 80885 100261af _initterm 80884->80885 80885->80883 80886->80883 80887 10026202 free 80886->80887 80887->80883 80889 10025d0a ??2@YAPAXI 80888->80889 80890 10025d27 80888->80890 80889->80890 80891 10025d1b 80889->80891 80890->80870 80894 10019250 80891->80894 80893->80877 80904 10017090 12 API calls 80894->80904 80896 1001927b 80949 1001a700 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 80896->80949 80898 1001928b 80905 10011450 14 API calls 80898->80905 80900 1001929a 80906 10009db0 80900->80906 80903 100193b7 80904->80896 80905->80900 80950 10026920 80906->80950 80909 10026920 6 API calls 80910 10009dd1 80909->80910 80911 10026920 6 API calls 80910->80911 80912 10009de0 80911->80912 80913 10026920 6 API calls 80912->80913 80914 10009def 80913->80914 80915 10026920 6 API calls 80914->80915 80916 10009dfe 80915->80916 80917 10026920 6 API calls 80916->80917 80918 10009e0d 80917->80918 80919 10026920 6 API calls 80918->80919 80920 10009e1c 80919->80920 80921 10026920 6 API calls 80920->80921 80922 10009e2b 80921->80922 80923 10026920 6 API calls 80922->80923 80924 10009e3a 80923->80924 80925 10026920 6 API calls 80924->80925 80926 10009e49 80925->80926 80927 10026920 6 API calls 80926->80927 80928 10009e58 80927->80928 80929 10026920 6 API calls 80928->80929 80930 10009e67 80929->80930 80931 10026920 6 API calls 80930->80931 80932 10009e76 80931->80932 80933 10026920 6 API calls 80932->80933 80934 10009e85 80933->80934 80935 10026920 6 API calls 80934->80935 80936 10009e94 80935->80936 80937 10026920 6 API calls 80936->80937 80938 10009ea3 80937->80938 80939 10026920 6 API calls 80938->80939 80940 10009eb2 80939->80940 80941 10026920 6 API calls 80940->80941 80942 10009ec1 80941->80942 80943 10026920 6 API calls 80942->80943 80944 10009ed0 80943->80944 80945 10026920 6 API calls 80944->80945 80946 10009edf 80945->80946 80947 10026920 6 API calls 80946->80947 80948 10009eee 6E8E4BC0 GetVersion 80947->80948 80948->80903 80949->80898 80953 10026940 80950->80953 80954 10026958 80953->80954 80956 10009dc2 80954->80956 80957 10026530 80954->80957 80956->80909 80964 10026543 80957->80964 80958 100265b4 80959 10026655 80958->80959 80996 10026440 GetCurrentProcess 80958->80996 80959->80956 80963 10026440 3 API calls 80965 10026687 80963->80965 80964->80958 81006 10026aa0 SetLastError 80964->81006 80966 100266b4 80965->80966 80967 10026695 80965->80967 80970 100266c0 80966->80970 80971 100266df 80966->80971 80968 100264c0 2 API calls 80967->80968 80969 100266a4 80968->80969 80972 100264c0 2 API calls 80969->80972 80973 100264c0 2 API calls 80970->80973 80975 10026720 80971->80975 81007 10026aa0 SetLastError 80971->81007 80972->80959 80974 100266cf 80973->80974 80976 100264c0 2 API calls 80974->80976 80978 10026747 80975->80978 80979 10026728 80975->80979 80976->80959 80983 10026760 80978->80983 80984 1002677c 80978->80984 80980 100264c0 2 API calls 80979->80980 80981 10026737 80980->80981 80982 100264c0 2 API calls 80981->80982 80982->80959 80985 100264c0 2 API calls 80983->80985 80988 100267b9 80984->80988 80989 1002679d 80984->80989 80986 1002676f 80985->80986 80987 100264c0 2 API calls 80986->80987 80987->80959 81001 100264c0 80988->81001 80991 100264c0 2 API calls 80989->80991 80993 100267ac 80991->80993 80994 100264c0 2 API calls 80993->80994 80994->80959 80995 100264c0 2 API calls 80995->80959 80997 10026498 80996->80997 80998 10026477 80996->80998 80997->80963 80998->80997 80999 10026480 FlushInstructionCache 80998->80999 80999->80997 81000 1002649a VirtualProtect 80999->81000 81000->80997 81002 100264d2 81001->81002 81005 10026509 81001->81005 81003 100264e4 FlushInstructionCache 81002->81003 81002->81005 81004 1002650b VirtualProtect 81003->81004 81003->81005 81004->81005 81005->80995 81006->80964 81007->80971 81008 699733 81009 69973d 81008->81009 81010 69974e 81008->81010 81012 696939 81009->81012 81013 6968ea 3 API calls 81012->81013 81014 696950 81013->81014 81014->81010 81015 5eb300 81016 5eb6b2 81015->81016 81017 5eb336 81015->81017 81017->81016 81066 5c48b0 7 API calls 81017->81066 81020 5eb6c8 81021 69518e 35 API calls 81020->81021 81022 5eb6d3 81021->81022 81031 5eb6e0 81022->81031 81101 601480 31 API calls 81022->81101 81023 5eb645 81023->81020 81028 5eb691 81023->81028 81024 5eb5b4 SendMessageA 81037 5eb372 81024->81037 81025 682cc6 6 API calls 81025->81037 81030 695203 32 API calls 81028->81030 81029 5eb6f2 81029->81031 81034 695811 23 API calls 81029->81034 81032 5eb69c 81030->81032 81035 695340 35 API calls 81031->81035 81036 5eba8e 81031->81036 81100 5c4340 GetProcessHeap HeapFree 81032->81100 81033 682da8 6 API calls 81033->81037 81039 5eb707 81034->81039 81035->81036 81067 5eb1a0 81036->81067 81037->81023 81037->81024 81037->81025 81037->81033 81042 682db3 6 API calls 81037->81042 81056 5eb83f 81037->81056 81093 697675 81037->81093 81099 5e88a0 7 API calls 81037->81099 81043 5eb735 81039->81043 81062 5eb74c 81039->81062 81042->81037 81102 69584f 23 API calls 81043->81102 81044 695203 32 API calls 81047 5ebaaa 81044->81047 81045 5c48b0 7 API calls 81045->81056 81111 5c4340 GetProcessHeap HeapFree 81047->81111 81049 5ebac0 81051 5eb81d 81052 5eb821 81051->81052 81051->81056 81104 69584f 23 API calls 81052->81104 81053 5eba1d 81107 5c4340 GetProcessHeap HeapFree 81053->81107 81056->81045 81056->81053 81105 6054c0 67 API calls 81056->81105 81106 6028c0 55 API calls 81056->81106 81057 5eba31 81108 5c4340 GetProcessHeap HeapFree 81057->81108 81059 5eb743 81110 601480 31 API calls 81059->81110 81062->81051 81062->81052 81103 602110 31 API calls 81062->81103 81063 5eba46 81109 69584f 23 API calls 81063->81109 81066->81037 81112 695271 67 API calls _wctomb_s 81067->81112 81069 5eb1c8 81113 695593 35 API calls 81069->81113 81071 5eb209 81072 5eb238 wsprintfA 81071->81072 81073 5eb220 wsprintfA 81071->81073 81074 5eb252 81072->81074 81073->81074 81114 695593 35 API calls 81074->81114 81075 5eb1de 81075->81071 81119 695593 35 API calls 81075->81119 81078 5eb261 81079 5eb28c 81078->81079 81120 695593 35 API calls 81078->81120 81081 697675 38 API calls 81079->81081 81083 5eb2a7 81081->81083 81082 5eb282 81121 6955cf 34 API calls 81082->81121 81115 682ed4 29 API calls _wctomb_s 81083->81115 81086 5eb2b6 81087 5eb2ca 81086->81087 81116 699795 81086->81116 81089 695203 32 API calls 81087->81089 81090 5eb2d8 81089->81090 81091 695203 32 API calls 81090->81091 81092 5eb2e9 81091->81092 81092->81044 81094 6976ab 81093->81094 81095 69767f GetWindowTextLengthA 81093->81095 81094->81037 81122 69565e 81095->81122 81099->81037 81100->81016 81101->81029 81102->81059 81103->81062 81104->81059 81105->81056 81106->81056 81107->81057 81108->81063 81109->81059 81110->81031 81111->81049 81112->81069 81113->81075 81114->81078 81115->81086 81117 6997ab 81116->81117 81118 69979c SetWindowTextA 81116->81118 81117->81087 81118->81117 81119->81071 81120->81082 81121->81079 81130 6955e7 81122->81130 81125 695636 81137 6951ac 81125->81137 81127 69563e 81128 69564f 81127->81128 81129 695647 lstrlenA 81127->81129 81128->81094 81129->81128 81131 6955fa 81130->81131 81132 69562e GetWindowTextA 81131->81132 81133 695070 31 API calls 81131->81133 81132->81125 81134 695611 _wctomb_s 81133->81134 81136 69516b 32 API calls 81134->81136 81136->81132 81138 6951b8 81137->81138 81142 6951c7 _wctomb_s 81137->81142 81143 69513a 32 API calls 81138->81143 81140 6951bd 81141 695070 31 API calls 81140->81141 81141->81142 81142->81127 81143->81140 81144 10003220 81145 10003235 81144->81145 81171 100034dd 81144->81171 81175 100069f0 DeleteObject 81145->81175 81147 10003275 81176 10006940 81147->81176 81151 1000329e 81180 10003970 81151->81180 81153 100032b1 SelectObject 81155 1000b6e0 6 API calls 81153->81155 81156 10003303 81155->81156 81198 100042c0 PtInRegion 81156->81198 81158 10003314 81159 1000b6e0 6 API calls 81158->81159 81160 10003360 81159->81160 81199 100042c0 PtInRegion 81160->81199 81162 10003371 81163 1000b6e0 6 API calls 81162->81163 81164 100033c2 81163->81164 81200 100042c0 PtInRegion 81164->81200 81166 100033d3 81167 1000b6e0 6 API calls 81166->81167 81168 10003413 81167->81168 81201 100042c0 PtInRegion 81168->81201 81170 10003424 SelectObject DeleteDC DeleteObject 81172 10003454 81170->81172 81172->81171 81173 1000348d IsWindowVisible 81172->81173 81202 100246e0 60 API calls 81172->81202 81173->81172 81175->81147 81203 100069f0 DeleteObject 81176->81203 81178 10003292 81179 100034f0 40 API calls 81178->81179 81179->81151 81181 1000399c 81180->81181 81182 1000399e ??2@YAPAXI ??2@YAPAXI 81180->81182 81181->81182 81187 100039eb 81182->81187 81183 10003aee ??2@YAPAXI 81188 10003b4c ??2@YAPAXI 81183->81188 81184 10003a48 PtInRegion 81184->81187 81186 10003aac PtInRegion 81186->81187 81187->81183 81187->81184 81187->81186 81192 10003c54 81188->81192 81195 10003dbd OffsetRgn 81188->81195 81191 10003d16 _ftol 81191->81192 81192->81191 81192->81195 81193 10004270 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 81193->81153 81197 100040c2 81195->81197 81196 100041cd PtInRegion 81196->81197 81197->81193 81197->81196 81198->81158 81199->81162 81200->81166 81201->81170 81202->81172 81203->81178 81204 67ca06 81209 685820 GetLocalTime GetSystemTime 81204->81209 81208 67ca21 81210 68584a 81209->81210 81211 685885 GetTimeZoneInformation 81209->81211 81210->81211 81212 68587e 81210->81212 81211->81212 81216 68f15a 81212->81216 81215 67cc23 61 API calls 81215->81208 81217 68f173 81216->81217 81219 67ca11 81216->81219 81217->81219 81222 68f4ae 81217->81222 81219->81215 81223 68f19e 81222->81223 81224 68f4b7 81222->81224 81223->81219 81230 68f763 29 API calls _wctomb_s 81223->81230 81225 68aae4 _wctomb_s 29 API calls 81224->81225 81226 68f4be 81225->81226 81227 68f4cd 81226->81227 81231 68f4dc 81226->81231 81259 68ab45 LeaveCriticalSection 81227->81259 81230->81219 81232 68aae4 _wctomb_s 29 API calls 81231->81232 81233 68f4f2 81232->81233 81260 682872 81233->81260 81236 68f51d 81266 68ab45 LeaveCriticalSection 81236->81266 81237 68f757 81272 68ab45 LeaveCriticalSection 81237->81272 81240 68f523 GetTimeZoneInformation 81241 68f603 _wctomb_s 81240->81241 81245 68f539 WideCharToMultiByte 81240->81245 81241->81227 81242 68f61a _wctomb_s 81242->81237 81267 68390e 29 API calls _wctomb_s 81242->81267 81244 68f648 _wctomb_s 81248 6839f7 _wctomb_s 29 API calls 81244->81248 81247 68f5c6 WideCharToMultiByte 81245->81247 81247->81241 81250 68f655 81248->81250 81250->81237 81251 68f665 _wctomb_s 81250->81251 81268 68ab45 LeaveCriticalSection 81251->81268 81253 68f672 _wctomb_s 81269 682d1d 6 API calls _wctomb_s 81253->81269 81255 68f6a2 81255->81241 81270 682d1d 6 API calls _wctomb_s 81255->81270 81257 68f6d0 81257->81241 81271 682d1d 6 API calls _wctomb_s 81257->81271 81259->81223 81261 682884 81260->81261 81265 6828e1 81260->81265 81262 682895 _wctomb_s 81261->81262 81261->81265 81273 68ab99 46 API calls _wctomb_s 81261->81273 81262->81265 81274 68ab5a 9 API calls _wctomb_s 81262->81274 81265->81236 81265->81242 81266->81240 81267->81244 81268->81253 81269->81255 81270->81257 81271->81241 81272->81241 81273->81262 81274->81262 81275 1001d8e0 GetPropA 81276 1001d913 81275->81276 81277 1001d8f8 NtdllDefWindowProc_A 81275->81277 81278 1001d9f3 81276->81278 81279 1001d923 81276->81279 81281 1001d9af CallWindowProcA 81278->81281 81285 1001da10 81278->81285 81286 1001da60 81278->81286 81287 1001da24 81278->81287 81288 1001da38 81278->81288 81289 1001da4c 81278->81289 81280 1001d9de 81279->81280 81282 1001d931 81279->81282 81283 1001d99f 81279->81283 81319 10012370 7 API calls 81280->81319 81295 1001d933 81282->81295 81296 1001d98b 81282->81296 81292 1001d9a7 81283->81292 81293 1001d9ca 81283->81293 81320 1000dcd0 TrackMouseEvent CallWindowProcA 81285->81320 81324 1001dc10 CallWindowProcA 81286->81324 81321 1001db70 7 API calls 81287->81321 81322 1001dbb0 CallWindowProcA 81288->81322 81323 1001dbe0 CallWindowProcA 81289->81323 81292->81280 81292->81281 81318 10012350 29 API calls 81293->81318 81305 1001d960 CallWindowProcA InvalidateRect 81295->81305 81306 1001d938 81295->81306 81317 10012100 CallWindowProcA 81296->81317 81298 1001d9ee 81300 1001da1f 81302 1001da33 81303 1001da47 81311 1001d93d 81306->81311 81312 1001d94c 81306->81312 81307 1001da5b 81308 1001da6f 81309 1001d99a 81310 1001d9d9 81311->81281 81313 1001d942 81311->81313 81316 1001db30 56 API calls 81312->81316 81315 1001d95b 81316->81315 81317->81309 81318->81310 81319->81298 81320->81300 81321->81302 81322->81303 81323->81307 81324->81308 81325 10013720 SendMessageA 81326 1001c3e0 GetCurrentThreadId EnumThreadWindows 81327 696f83 81328 69fb7d 21 API calls 81327->81328 81329 696f98 81328->81329 81330 696fb8 81329->81330 81331 696fa1 CallNextHookEx 81329->81331 81332 69f5f5 28 API calls 81330->81332 81343 697170 81331->81343 81333 696fc8 81332->81333 81334 6970e0 CallNextHookEx 81333->81334 81335 69703d 81333->81335 81336 696ff1 GetClassLongA 81333->81336 81334->81343 81344 697163 UnhookWindowsHookEx 81334->81344 81338 6970ee GetWindowLongA 81335->81338 81339 697045 81335->81339 81336->81334 81340 697005 81336->81340 81338->81334 81346 6970fe GetPropA 81338->81346 81360 696cf0 81339->81360 81341 697029 lstrcmpiA 81340->81341 81342 697012 GlobalGetAtomNameA 81340->81342 81341->81334 81341->81335 81342->81341 81344->81343 81346->81334 81347 697111 SetPropA GetPropA 81346->81347 81347->81334 81348 697125 GlobalAddAtomA 81347->81348 81349 69713a 81348->81349 81350 69713f SetWindowLongA 81348->81350 81349->81350 81350->81334 81351 6970cb 81352 6970d0 SetWindowLongA 81351->81352 81352->81334 81356 697097 81357 69709c GetWindowLongA 81356->81357 81358 6970b9 81357->81358 81358->81334 81359 6970bd SetWindowLongA 81358->81359 81359->81334 81361 696cfc 81360->81361 81362 696d00 81360->81362 81361->81351 81368 696ae0 81361->81368 81378 696c39 81362->81378 81364 696d08 81365 694c0a 29 API calls 81364->81365 81366 696d16 81365->81366 81386 69990c 81366->81386 81369 696aea __EH_prolog 81368->81369 81370 69fb7d 21 API calls 81369->81370 81371 696b02 81370->81371 81372 696b5f 81371->81372 81398 69696d GetWindowRect GetWindowLongA 81371->81398 81392 697b0d 81372->81392 81375 696b88 81375->81351 81375->81356 81379 696c43 __EH_prolog 81378->81379 81380 69f61b 28 API calls 81379->81380 81381 696c49 81380->81381 81384 696c87 81381->81384 81390 694f44 29 API calls _wctomb_s 81381->81390 81383 696c6b 81383->81384 81391 69aec6 29 API calls __EH_prolog 81383->81391 81384->81364 81387 699913 81386->81387 81388 69992f 81386->81388 81387->81388 81389 699919 GetParent 81387->81389 81388->81361 81389->81388 81390->81383 81391->81384 81400 697b51 81392->81400 81466 696c12 81392->81466 81393 697b2f 81394 696b70 81393->81394 81471 697543 81393->81471 81394->81375 81399 696990 92 API calls 81394->81399 81398->81372 81399->81375 81401 697b5b __EH_prolog 81400->81401 81402 697b8a 81401->81402 81403 697b72 81401->81403 81404 697bcf 81402->81404 81455 697b7d 81402->81455 81482 696cab 81402->81482 81476 6980ed 81403->81476 81406 697bec 81404->81406 81407 697bd4 81404->81407 81499 6a0965 6 API calls 81406->81499 81498 696a6a 66 API calls 81407->81498 81411 697be4 81411->81406 81411->81455 81413 697c0d 81414 697c2b 81413->81414 81423 697c52 81413->81423 81500 6a09d5 LeaveCriticalSection 81414->81500 81415 697ccf 81501 6a09d5 LeaveCriticalSection 81415->81501 81418 697ced 81502 6a09d5 LeaveCriticalSection 81418->81502 81419 697d09 GetVersion 81420 697d1b 81419->81420 81424 697fb0 81420->81424 81425 697ea9 81420->81425 81426 697f28 81420->81426 81427 697ee2 81420->81427 81428 697d2c 81420->81428 81429 697e3e 81420->81429 81430 697eb7 81420->81430 81431 697e8b 81420->81431 81432 697ec1 81420->81432 81433 697d42 81420->81433 81434 697f02 81420->81434 81435 697f19 81420->81435 81436 697d59 81420->81436 81437 697ed5 81420->81437 81438 697f10 81420->81438 81439 697e15 81420->81439 81420->81455 81459 697d67 81420->81459 81460 697dd4 81420->81460 81422 697c38 81422->81419 81422->81420 81422->81455 81423->81415 81423->81418 81423->81424 81516 6a09d5 LeaveCriticalSection 81424->81516 81445 69b5ce 57 API calls 81425->81445 81453 696cab 58 API calls 81426->81453 81426->81455 81457 696cab 58 API calls 81427->81457 81503 69b5ce 81428->81503 81513 69a83b 57 API calls 81429->81513 81514 69a83b 57 API calls 81430->81514 81443 696cab 58 API calls 81431->81443 81515 69a83b 57 API calls 81432->81515 81447 696cab 58 API calls 81433->81447 81451 696cab 58 API calls 81434->81451 81440 696cab 58 API calls 81435->81440 81450 696cab 58 API calls 81436->81450 81456 696cab 58 API calls 81437->81456 81452 696cab 58 API calls 81438->81452 81441 696cab 58 API calls 81439->81441 81440->81455 81441->81455 81454 697e93 81443->81454 81445->81455 81447->81455 81450->81455 81451->81455 81452->81455 81453->81455 81458 696cab 58 API calls 81454->81458 81455->81393 81456->81455 81457->81455 81458->81455 81508 696cd2 81459->81508 81512 69b661 58 API calls __EH_prolog 81460->81512 81463 697d93 81511 697339 58 API calls __EH_prolog 81463->81511 81467 69fb7d 21 API calls 81466->81467 81468 696c24 81467->81468 81470 697543 2 API calls 81468->81470 81469 696c37 81469->81393 81470->81469 81472 697550 81471->81472 81473 697572 CallWindowProcA 81471->81473 81472->81473 81475 69755e DefWindowProcA 81472->81475 81474 697585 81473->81474 81474->81394 81475->81474 81477 698145 81476->81477 81479 69810b 81476->81479 81478 69fb7d 21 API calls 81477->81478 81480 698154 81478->81480 81479->81455 81480->81479 81517 6986e4 81480->81517 81483 696c39 57 API calls 81482->81483 81484 696cb4 81483->81484 81559 69af2b 81484->81559 81486 696cc1 81487 69990c GetParent 81486->81487 81488 696ccb 81487->81488 81489 696a09 81488->81489 81566 6996ff 81489->81566 81491 696a1b 81492 696a63 81491->81492 81569 698276 81491->81569 81492->81404 81494 696a29 81495 698276 62 API calls 81494->81495 81496 696a35 81495->81496 81496->81492 81497 696a4e SendMessageA 81496->81497 81497->81492 81498->81411 81499->81413 81500->81422 81501->81455 81502->81422 81577 69b55c 81503->81577 81505 69b5d5 81506 69af2b 30 API calls 81505->81506 81507 69b5e0 81506->81507 81507->81455 81509 696c39 57 API calls 81508->81509 81510 696cd9 81509->81510 81510->81463 81511->81460 81512->81455 81513->81455 81514->81455 81515->81455 81516->81455 81518 6986ee __EH_prolog 81517->81518 81519 696c39 57 API calls 81518->81519 81521 6986fa 81519->81521 81520 698766 81520->81479 81521->81520 81522 69876e 81521->81522 81523 698710 GetParent 81521->81523 81524 6986b7 72 API calls 81522->81524 81525 69871f 81523->81525 81524->81520 81525->81520 81529 6986b7 81525->81529 81530 69fb7d 21 API calls 81529->81530 81531 6986c9 81530->81531 81535 698788 81531->81535 81534 697339 58 API calls __EH_prolog 81534->81520 81536 6987cd 81535->81536 81537 698792 SendMessageA 81535->81537 81541 6987e3 81536->81541 81538 6987b3 81537->81538 81540 6986e0 81538->81540 81540->81534 81542 698862 81541->81542 81543 6987f6 81541->81543 81546 69888d 81542->81546 81548 698877 81542->81548 81544 6987f8 81543->81544 81545 69883a 81543->81545 81544->81546 81544->81548 81550 69880b 81544->81550 81555 699eae 81545->81555 81551 697b51 73 API calls 81546->81551 81552 698835 81546->81552 81549 697b51 73 API calls 81548->81549 81549->81552 81550->81546 81553 698810 81550->81553 81551->81552 81552->81540 81554 699eae 28 API calls 81553->81554 81554->81552 81556 699ebe 81555->81556 81558 699ec3 81555->81558 81557 69f5f5 28 API calls 81556->81557 81557->81558 81558->81552 81560 69af35 __EH_prolog 81559->81560 81561 69afaa 81560->81561 81564 69af46 81560->81564 81565 69238d RaiseException 81560->81565 81563 694c0a 29 API calls 81561->81563 81563->81564 81564->81486 81567 699712 81566->81567 81568 699706 GetWindowLongA 81566->81568 81568->81491 81570 698281 81569->81570 81572 69827a 81569->81572 81570->81494 81572->81570 81573 698296 81572->81573 81576 698231 62 API calls 81572->81576 81574 696cab 58 API calls 81573->81574 81575 69829c 81574->81575 81575->81494 81576->81572 81578 69b566 __EH_prolog 81577->81578 81579 69f61b 28 API calls 81578->81579 81580 69b56c 81579->81580 81583 69b5aa 81580->81583 81585 694f44 29 API calls _wctomb_s 81580->81585 81582 69b58e 81582->81583 81586 69aec6 29 API calls __EH_prolog 81582->81586 81583->81505 81585->81582 81586->81583 81587 699882 81588 699889 ShowWindow 81587->81588 81589 699898 81587->81589 81588->81589 81590 5bd9b0 81591 5bda6b 81590->81591 81592 5bd9e8 81590->81592 81593 695811 23 API calls 81592->81593 81594 5bd9f0 81593->81594 81605 69598f 81594->81605 81596 5bda53 81626 6958d2 39 API calls __EH_prolog 81596->81626 81598 5bda5f 81627 69584f 23 API calls 81598->81627 81599 5bda42 81625 695baa 38 API calls 81599->81625 81602 5bda17 81602->81596 81602->81599 81618 695ae6 81602->81618 81603 5bda4a 81603->81596 81606 69518e 35 API calls 81605->81606 81607 6959b8 81606->81607 81628 695cbb 81607->81628 81610 695340 35 API calls 81611 6959d5 CreateFileA 81610->81611 81613 695a99 81611->81613 81614 695a75 81611->81614 81613->81602 81614->81613 81615 695a7c GetLastError 81614->81615 81616 695a8b 81615->81616 81617 695340 35 API calls 81616->81617 81617->81613 81619 695b2b 81618->81619 81620 695af4 WriteFile 81618->81620 81619->81602 81621 695b0b GetLastError 81620->81621 81622 695b1a 81620->81622 81651 69a8b1 36 API calls 81621->81651 81622->81619 81652 69a972 36 API calls __EH_prolog 81622->81652 81625->81603 81626->81598 81627->81591 81643 685e68 81628->81643 81630 695cc5 GetFullPathNameA 81631 695ce8 lstrcpynA 81630->81631 81632 695cfa 81630->81632 81641 6959c7 81631->81641 81644 695d8b 81632->81644 81635 695d2b 81636 695d38 81635->81636 81637 695d31 CharUpperA 81635->81637 81639 695d6a 81636->81639 81640 695d3e FindFirstFileA 81636->81640 81637->81636 81638 695203 32 API calls 81638->81641 81639->81638 81640->81639 81642 695d53 FindClose lstrcpyA 81640->81642 81641->81610 81642->81639 81643->81630 81645 6955e7 34 API calls 81644->81645 81646 695d9d __startOneArgErrorHandling 81645->81646 81647 695da9 lstrcpynA 81646->81647 81648 695dbc 81647->81648 81649 695636 35 API calls 81648->81649 81650 695d11 GetVolumeInformationA 81649->81650 81650->81635 81650->81639 81651->81622 81653 10020a2e 81656 10019482 81653->81656 81657 10019488 81656->81657 81662 100031a0 LoadCursorA RegisterClassExA 81657->81662 81659 10019496 81660 100194b6 81659->81660 81661 1001949e GetCurrentThreadId SetWindowsHookExA 81659->81661 81661->81660 81662->81659 81663 5e7770 81666 5df2b0 81663->81666 81665 5e7781 81667 5df2db 81666->81667 81668 5df375 81666->81668 81670 5df303 GetProcAddress 81667->81670 81671 5df2fa 81667->81671 81669 5df616 81668->81669 81672 5df3a3 81668->81672 81740 682da8 6 API calls _wctomb_s 81668->81740 81669->81665 81676 5df358 81670->81676 81677 5df323 81670->81677 81737 682da8 6 API calls _wctomb_s 81671->81737 81683 5df4e1 81672->81683 81686 5df3ce _wctomb_s 81672->81686 81676->81665 81738 5e9170 65 API calls 81677->81738 81679 5df4e6 LoadLibraryA 81681 5df4f6 GetProcAddress 81679->81681 81679->81683 81680 5df333 81739 5df690 132 API calls 81680->81739 81681->81683 81683->81679 81687 5df53c 81683->81687 81688 5df528 FreeLibrary 81683->81688 81684 5df347 81689 695203 32 API calls 81684->81689 81685 5df4ac LoadLibraryA 81685->81687 81692 5df4b9 GetProcAddress 81685->81692 81686->81685 81690 5df3fa 81686->81690 81691 5df422 81686->81691 81687->81669 81694 5df558 81687->81694 81695 5df551 FreeLibrary 81687->81695 81688->81683 81689->81676 81693 69544c 38 API calls 81690->81693 81727 69544c 81691->81727 81692->81687 81697 5df4c9 81692->81697 81698 5df406 LoadLibraryA 81693->81698 81703 5df569 81694->81703 81704 5df5c0 81694->81704 81695->81694 81697->81687 81700 695203 32 API calls 81698->81700 81702 5df416 81700->81702 81701 69544c 38 API calls 81705 5df44c LoadLibraryA 81701->81705 81702->81691 81702->81692 81741 5e9170 65 API calls 81703->81741 81743 5e9170 65 API calls 81704->81743 81706 695203 32 API calls 81705->81706 81709 5df45c 81706->81709 81713 695203 32 API calls 81709->81713 81710 5df5d4 81744 5df690 132 API calls 81710->81744 81711 5df57e 81742 5df690 132 API calls 81711->81742 81716 5df46d 81713->81716 81715 5df599 81718 695203 32 API calls 81715->81718 81716->81692 81719 5df471 81716->81719 81717 5df5ef 81720 695203 32 API calls 81717->81720 81721 5df5aa 81718->81721 81722 5df4a4 81719->81722 81724 69544c 38 API calls 81719->81724 81723 5df600 81720->81723 81721->81665 81722->81685 81722->81692 81723->81665 81725 5df494 LoadLibraryA 81724->81725 81726 695203 32 API calls 81725->81726 81726->81722 81728 695456 __EH_prolog 81727->81728 81729 695471 81728->81729 81730 695475 lstrlenA 81728->81730 81745 6953a8 81729->81745 81730->81729 81732 695493 81749 694f78 81732->81749 81735 695203 32 API calls 81736 5df438 81735->81736 81736->81701 81737->81670 81738->81680 81739->81684 81740->81672 81741->81711 81742->81715 81743->81710 81744->81717 81746 6953bc 81745->81746 81747 6953c2 _wctomb_s 81745->81747 81748 695070 31 API calls 81746->81748 81747->81732 81748->81747 81750 694f95 81749->81750 81751 694f87 InterlockedIncrement 81749->81751 81753 695340 35 API calls 81750->81753 81752 694fa5 81751->81752 81752->81735 81753->81752 81754 696f07 81755 69fc12 7 API calls 81754->81755 81759 696f1b 81755->81759 81756 696f65 81758 696f69 81756->81758 81761 696da8 81756->81761 81759->81756 81788 698c01 7 API calls 81759->81788 81789 685e68 81761->81789 81763 696db2 GetPropA 81764 696e92 81763->81764 81765 696de5 81763->81765 81766 696cab 58 API calls 81764->81766 81767 696dee 81765->81767 81768 696e71 81765->81768 81770 696e9a 81766->81770 81771 696e4d SetWindowLongA RemovePropA GlobalFindAtomA GlobalDeleteAtom 81767->81771 81772 696df3 81767->81772 81769 696cab 58 API calls 81768->81769 81774 696e77 81769->81774 81775 696cab 58 API calls 81770->81775 81773 696eb0 CallWindowProcA 81771->81773 81772->81773 81776 696dfe 81772->81776 81777 696e39 81773->81777 81792 696a6a 66 API calls 81774->81792 81779 696ea2 81775->81779 81780 696cab 58 API calls 81776->81780 81777->81758 81782 696a09 64 API calls 81779->81782 81783 696e04 81780->81783 81781 696e89 81784 696eac 81781->81784 81782->81784 81790 69696d GetWindowRect GetWindowLongA 81783->81790 81784->81773 81784->81777 81786 696e14 CallWindowProcA 81791 696990 92 API calls 81786->81791 81788->81756 81789->81763 81790->81786 81791->81777 81792->81781 81793 10007a30 GetPropA 81794 10007a65 81793->81794 81795 10007a49 NtdllDefWindowProc_A 81793->81795 81796 10007b14 81794->81796 81797 10007a75 81794->81797 81800 10007b8d CallWindowProcA 81796->81800 81803 10007b30 81796->81803 81804 10007b76 81796->81804 81805 10007b47 81796->81805 81806 10007b5e 81796->81806 81798 10007a7b 81797->81798 81799 10007afd 81797->81799 81798->81800 81808 10007ae6 81798->81808 81809 10007aad 81798->81809 81810 10007acf 81798->81810 81816 10007a96 81798->81816 81829 1000dcd0 TrackMouseEvent CallWindowProcA 81799->81829 81802 10007baf 81800->81802 81830 100078e0 CallWindowProcA 81803->81830 81833 10007960 CallWindowProcA 81804->81833 81831 100078a0 CallWindowProcA 81805->81831 81832 10007920 CallWindowProcA 81806->81832 81807 10007b0e 81828 10012100 CallWindowProcA 81808->81828 81826 10012350 29 API calls 81809->81826 81827 100079a0 10 API calls 81810->81827 81815 10007b87 81818 10007b41 81819 10007b58 81821 10007b70 81823 10007abe 81824 10007ae0 81825 10007af7 81826->81823 81827->81824 81828->81825 81829->81807 81830->81818 81831->81819 81832->81821 81833->81815 81834 1000c930 GetWindowLongA 81835 1000cb55 81834->81835 81836 1000c959 81834->81836 81851 10015c70 37 API calls 81835->81851 81836->81835 81837 1000c962 GetWindowLongA 81836->81837 81839 1000c977 81837->81839 81841 1000c98c 15 API calls 81839->81841 81842 1000c97e IsWindowEnabled 81839->81842 81840 1000cb66 81844 1000caa6 InflateRect IsWindowEnabled 81841->81844 81845 1000ca98 81841->81845 81842->81841 81847 1000cae3 81844->81847 81848 1000cae7 GetFocus 81844->81848 81845->81844 81846 1000cb3e 81845->81846 81850 1000af00 22 API calls 81847->81850 81848->81847 81850->81846 81851->81840 81852 1000d330 GetPropA 81853 1000d365 81852->81853 81854 1000d349 NtdllDefWindowProc_A 81852->81854 81855 1000d371 81853->81855 81856 1000d3b6 81853->81856 81858 1000d373 81855->81858 81859 1000d39f 81855->81859 81857 1000d3f7 81856->81857 81861 1000d3c4 CallWindowProcA 81856->81861 81868 10012370 7 API calls 81857->81868 81858->81861 81863 1000d37d 81858->81863 81867 10012100 CallWindowProcA 81859->81867 81865 1000d3e1 81861->81865 81864 1000d3b0 81866 1000d409 81867->81864 81868->81866 81869 1001a4f0 81870 1001a50b 81869->81870 81871 1001a65d CallNextHookEx 81869->81871 81870->81871 81872 1001a574 81870->81872 81875 1001a526 81870->81875 81873 1001a5c7 81872->81873 81877 1001a579 81872->81877 81873->81871 81874 1001a5d7 GetPropA 81873->81874 81874->81871 81876 1001a5ec GetPropA 81874->81876 81875->81871 81881 1001a54f SetPropA 81875->81881 81876->81871 81878 1001a5fb GetPropA 81876->81878 81877->81871 81884 1001a5a2 SetPropA 81877->81884 81879 1001a627 GetClassNameA 81878->81879 81880 1001a60a GetPropA 81878->81880 81889 1001a030 134 API calls 81879->81889 81888 10019730 8 API calls 81880->81888 81887 1001a56f 81881->81887 81884->81887 81885 1001a625 81886 1001a64c SetPropA 81885->81886 81886->81871 81887->81871 81888->81885 81889->81886 81890 10013170 GetClientRect 81891 1000fbf0 5 API calls 81890->81891 81892 100131bd 81891->81892 81893 10012060 2 API calls 81892->81893 81894 100131dd SelectObject 81893->81894 81922 10009a50 81894->81922 81896 100131f4 IsWindowEnabled 81897 1001320c 81896->81897 81899 10013214 81896->81899 81898 10013251 GetFocus 81897->81898 81897->81899 81898->81899 81900 1000b6e0 6 API calls 81899->81900 81901 100132b6 InflateRect GetWindowTextA 81900->81901 81902 10013341 SendMessageA 81901->81902 81903 1001340a 81901->81903 81904 1001335b 81902->81904 81908 100133f0 81902->81908 81905 10013413 SendMessageA 81903->81905 81906 100134ac 81903->81906 81907 10013363 GetIconInfo GetObjectA GetTextExtentPointA DeleteObject DeleteObject 81904->81907 81904->81908 81905->81908 81909 1001342a 81905->81909 81910 10013669 81906->81910 81912 100134dd DrawTextA 81906->81912 81913 10013538 GetPropA 81906->81913 81907->81908 81908->81906 81909->81908 81911 1001342e GetObjectA GetTextExtentPointA 81909->81911 81914 1000fc70 SelectObject DeleteDC DeleteObject 81910->81914 81911->81908 81912->81913 81917 100135cd IsWindowEnabled 81913->81917 81918 100135ca SetTextColor 81913->81918 81916 100136a7 81914->81916 81917->81918 81920 10013631 SetBkMode DrawTextA 81918->81920 81921 10013613 OffsetRect 81918->81921 81920->81910 81921->81920 81923 10025cb0 81924 10025cb5 81923->81924 81927 1002615b _onexit __dllonexit 81924->81927 81926 10025cda 81927->81926 81928 10024770 81929 10024782 81928->81929 81930 100248c0 81928->81930 81933 100248a9 81929->81933 81939 10024788 81929->81939 81931 100248c7 81930->81931 81932 1002493e 81930->81932 81935 10024938 81931->81935 81938 10024a23 CallWindowProcA 81931->81938 81955 100248d8 81931->81955 81936 100249c4 81932->81936 81937 10024945 81932->81937 82102 10021500 187 API calls 81933->82102 81958 100249cb 81936->81958 81959 10024a1c 81936->81959 81956 10024947 81937->81956 81957 100249af 81937->81957 81939->81938 81940 10024840 81939->81940 81941 10024801 81939->81941 81942 10024a06 81939->81942 81943 100247a6 81939->81943 81944 1002486a 81939->81944 81945 1002482b 81939->81945 81946 100247ec 81939->81946 81947 100249f0 81939->81947 81948 100247d0 81939->81948 81949 10024816 81939->81949 81950 10024894 81939->81950 81951 10024855 81939->81951 81952 100247bb 81939->81952 81953 1002487f 81939->81953 82097 10022580 29 API calls 81940->82097 82064 100223f0 81941->82064 82112 10021c00 38 API calls 81942->82112 82093 10021ca0 29 API calls 81943->82093 82099 10022070 CallWindowProcA 81944->82099 82096 10021a80 141 API calls 81945->82096 82051 100227c0 CallWindowProcA 81946->82051 82111 10022720 240 API calls 81947->82111 82095 10012460 SendMessageA 81948->82095 82067 10022200 81949->82067 82101 10012100 CallWindowProcA 81950->82101 82098 10022790 107 API calls 81951->82098 82094 10022430 LoadCursorA SetCursor CallWindowProcA 81952->82094 82100 10024d50 CallWindowProcA 81953->82100 81954 100248bc 81978 100248f4 81955->81978 81979 10024909 81955->81979 81980 1002491e 81955->81980 81981 100248df 81955->81981 81968 1002494e 81956->81968 81969 1002498f 81956->81969 82109 10022680 109 API calls 81957->82109 81958->81942 81960 100249cd 81958->81960 81959->81938 81967 10024a40 81959->81967 81960->81947 81984 100249d4 81960->81984 82113 10021c60 17 API calls 81967->82113 81995 10024979 81968->81995 82011 10024964 81968->82011 82012 1002495a 81968->82012 81969->81938 82001 1002499a 81969->82001 82104 100225e0 188 API calls 81978->82104 82105 100216f0 110 API calls 81979->82105 82081 10022a20 IsWindowVisible 81980->82081 82103 10021800 156 API calls 81981->82103 81983 10024812 81984->81938 82006 100249db 81984->82006 81986 10024827 81988 1002483c 81989 10024a02 81991 10024851 81992 10024a18 81993 10024866 82107 10012370 7 API calls 81995->82107 81996 1002487b 81997 100247b7 81998 10024890 81999 100248a5 82000 100247cc 82108 10022630 8 API calls 82001->82108 82002 100247d7 82025 100220a0 82002->82025 82004 100249c0 82110 100217a0 240 API calls 82006->82110 82007 10024905 82008 1002491a 82009 10024934 82010 10024a51 82106 100224c0 241 API calls 82011->82106 82012->81995 82018 1002495f 82012->82018 82016 100248f0 82018->81938 82020 1002498b 82021 100249ab 82022 100247e8 82023 100249ec 82024 10024975 82026 100220b4 IsWindowVisible 82025->82026 82027 100221eb 82025->82027 82026->82027 82028 100220c6 82026->82028 82027->82022 82029 100220d0 GetWindowRect 82028->82029 82030 1002211a 82028->82030 82031 100220fd 82029->82031 82114 10024e80 GetWindowInfo 82030->82114 82031->82030 82126 10024390 7 API calls 82031->82126 82034 10022123 82035 10022135 82034->82035 82127 100250c0 40 API calls 82034->82127 82035->82027 82038 10022164 IsRectEmpty 82035->82038 82039 1002215a 82035->82039 82037 1002212e 82128 10025870 80 API calls 82037->82128 82042 10022162 82038->82042 82129 10023530 99 API calls 82039->82129 82043 10022187 IsRectEmpty 82042->82043 82044 1002219e IsRectEmpty 82042->82044 82043->82044 82045 10022194 82043->82045 82046 100221ab 82044->82046 82047 100221bd 82044->82047 82048 10015840 39 API calls 82045->82048 82046->82047 82130 10023960 43 API calls 82046->82130 82050 100221c7 SendMessageA 82047->82050 82048->82044 82050->82022 82052 100227ee 82051->82052 82062 1002285d 82051->82062 82053 10024e80 27 API calls 82052->82053 82054 100227f8 82053->82054 82055 100228a4 82054->82055 82056 10022809 82054->82056 82159 10022f90 GetMenu 82055->82159 82056->82062 82157 10022f90 GetMenu 82056->82157 82058 100228c8 82058->82062 82160 10022fd0 GetMenuItemCount GetMenuItemRect GetMenuItemRect 82058->82160 82060 10022852 82060->82062 82158 10022fd0 GetMenuItemCount GetMenuItemRect GetMenuItemRect 82060->82158 82065 1002240d CallWindowProcA 82064->82065 82066 100223fe 82064->82066 82065->81983 82066->82065 82068 10022219 82067->82068 82069 100223cc CallWindowProcA 82067->82069 82068->82069 82070 10022231 82068->82070 82071 1002223f 82068->82071 82069->81986 82161 10024730 ShowWindow ShowWindow ShowWindow ShowWindow 82070->82161 82072 1002224f 82071->82072 82162 10024730 ShowWindow ShowWindow ShowWindow ShowWindow 82071->82162 82075 1002225f GetWindowRect SetWindowPos SetWindowPos SetWindowPos 82072->82075 82076 1002234c SetWindowPos SetWindowPos SetWindowPos 82072->82076 82078 100223b8 SetWindowPos 82075->82078 82076->82078 82077 1002223a 82077->82069 82078->82069 82079 100223c5 82078->82079 82163 10025870 80 API calls 82079->82163 82082 10022a70 CallWindowProcA 82081->82082 82083 10022a36 82081->82083 82082->82009 82083->82082 82084 10022a96 82083->82084 82085 10022aca 82084->82085 82086 10022aae GetMenu 82084->82086 82088 10022ae2 GetWindowRect SendMessageA 82085->82088 82089 10022b07 CallWindowProcA 82085->82089 82086->82085 82087 10022abe SetMenu 82086->82087 82087->82085 82088->82089 82090 10022b32 82089->82090 82091 10022b49 82090->82091 82092 10022b3e SetMenu 82090->82092 82091->82009 82092->82091 82093->81997 82094->82000 82095->82002 82096->81988 82097->81991 82098->81993 82099->81996 82100->81998 82101->81999 82102->81954 82103->82016 82104->82007 82105->82008 82106->82024 82107->82020 82108->82021 82109->82004 82110->82023 82111->81989 82112->81992 82113->82010 82115 10024ec6 82114->82115 82117 10024ef0 82115->82117 82150 10024ff0 IsZoomed 82115->82150 82118 10024efc IsWindowVisible 82117->82118 82119 10024fdd 82117->82119 82118->82119 82120 10024f0e OffsetRect OffsetRect 82118->82120 82119->82034 82121 10024f54 EqualRect 82120->82121 82122 10024f7e 82120->82122 82121->82122 82123 10024f6c EqualRect 82121->82123 82131 10025780 82122->82131 82123->82119 82123->82122 82125 10024fcf 82125->82034 82126->82030 82127->82037 82128->82035 82129->82042 82130->82047 82132 10025790 IsIconic 82131->82132 82134 10025850 82131->82134 82133 1002579e IsZoomed 82132->82133 82137 100257ac 82132->82137 82133->82137 82135 1002586b 82134->82135 82156 10024650 RemovePropA RemovePropA RemovePropA RemovePropA 82134->82156 82135->82125 82138 100257f6 82137->82138 82139 10025837 82137->82139 82140 10025801 IsRectEmpty 82138->82140 82151 10024520 82138->82151 82139->82134 82139->82135 82143 10025845 82139->82143 82140->82135 82142 10025812 IsWindowVisible 82140->82142 82144 10025820 82142->82144 82145 1002582b 82142->82145 82155 10024730 ShowWindow ShowWindow ShowWindow ShowWindow 82143->82155 82154 10024730 ShowWindow ShowWindow ShowWindow ShowWindow 82144->82154 82145->82125 82148 1002584e 82148->82125 82149 10025829 82149->82125 82150->82117 82152 10024643 82151->82152 82153 10024531 8 API calls 82151->82153 82152->82140 82153->82152 82154->82149 82155->82148 82156->82135 82157->82060 82158->82062 82159->82058 82160->82062 82161->82077 82162->82072 82163->82069 82164 10021370 GetPropA 82165 100213a7 82164->82165 82166 1002138a NtdllDefWindowProc_A 82164->82166 82167 10021476 NtdllDefWindowProc_A SendMessageA 82165->82167 82173 100213b4 82165->82173 82168 100213ec 82169 100213f4 82168->82169 82170 10021409 82168->82170 82188 10004bd0 82169->82188 82171 10021411 82170->82171 82172 10021426 82170->82172 82215 10004510 12 API calls 82171->82215 82176 10021443 82172->82176 82177 1002142e 82172->82177 82173->82168 82178 100213e3 ShowWindow 82173->82178 82179 100213d5 IsWindowVisible 82173->82179 82183 10021462 NtdllDefWindowProc_A 82176->82183 82184 1002144e 82176->82184 82216 100048e0 12 API calls 82177->82216 82178->82168 82179->82168 82179->82178 82180 10021402 82181 1002141f 82217 10002e40 18 API calls 82184->82217 82185 1002143c 82187 1002145b 82189 10004cf1 NtdllDefWindowProc_A 82188->82189 82190 10004be3 82188->82190 82189->82180 82190->82189 82191 10004c11 82190->82191 82192 10004cb1 82190->82192 82193 10004c91 82190->82193 82194 10004c71 82190->82194 82195 10004c51 82190->82195 82196 10004c31 82190->82196 82197 10004cd1 82190->82197 82198 10004bf2 82190->82198 82242 10005900 IsWindowEnabled EnableWindow NtdllDefWindowProc_A 82191->82242 82218 10005a40 IsWindowEnabled 82192->82218 82246 10005d40 77 API calls 82193->82246 82245 10006010 17 API calls 82194->82245 82244 10006210 6 API calls 82195->82244 82243 100062b0 IsWindowEnabled SendMessageA NtdllDefWindowProc_A 82196->82243 82247 10005940 57 API calls 82197->82247 82241 10004b70 GetWindowRect PtInRect 82198->82241 82207 10004c8b 82207->82180 82208 10004cab 82208->82180 82209 10004c0b 82209->82180 82210 10004c2b 82210->82180 82211 10004ccb 82211->82180 82212 10004ceb 82212->82180 82213 10004c4b 82213->82180 82214 10004c6b 82214->82180 82215->82181 82216->82185 82217->82187 82219 10005a56 SendMessageA 82218->82219 82220 10005a6f GetWindowRect IsRectEmpty 82218->82220 82219->82211 82221 10005bb2 82220->82221 82222 10005aaf PtInRect 82220->82222 82223 10005bc0 GetWindowLongA 82221->82223 82224 10005d11 82221->82224 82225 10005ae5 PtInRect 82222->82225 82226 10005abe 82222->82226 82228 10005cf1 SendMessageA 82223->82228 82229 10005bd7 SetRect OffsetRect SetRect SetRect PtInRect 82223->82229 82230 10005d18 SendMessageA 82224->82230 82225->82226 82227 10005b10 PtInRect 82225->82227 82240 10005b7a 82226->82240 82248 10004e30 GetWindowRect 82226->82248 82227->82226 82231 10005b3b PtInRect 82227->82231 82228->82211 82232 10005c7d PtInRect 82229->82232 82233 10005c5d LoadCursorA SetCursor 82229->82233 82230->82211 82231->82226 82235 10005ca7 PtInRect 82232->82235 82236 10005c8a LoadCursorA SetCursor 82232->82236 82233->82230 82234 10005b91 SetTimer 82234->82221 82237 10005cd1 SendMessageA 82235->82237 82238 10005cb4 LoadCursorA SetCursor 82235->82238 82236->82230 82237->82211 82238->82230 82240->82221 82240->82223 82240->82234 82241->82209 82242->82210 82243->82213 82244->82214 82245->82207 82246->82208 82247->82212 82249 10005585 82248->82249 82250 10004e8e 82248->82250 82249->82240 82250->82249 82251 10006940 DeleteObject 82250->82251 82254 10004ebd 82251->82254 82252 1000556e 82310 10006920 DeleteObject 82252->82310 82254->82252 82255 10006940 DeleteObject 82254->82255 82256 10004fbf 82255->82256 82257 1000555d 82256->82257 82259 10004fcf SelectObject SetBkMode 82256->82259 82309 10006920 DeleteObject 82257->82309 82260 10005016 82259->82260 82261 1000b4c0 5 API calls 82260->82261 82262 1000505f 82261->82262 82292 100055a0 82262->82292 82265 1000508f DrawIconEx 82267 100050bf GetWindowTextA DrawTextA 82265->82267 82268 10005167 82267->82268 82269 1000549b 82267->82269 82270 10005172 IsRectEmpty 82268->82270 82271 1000521c IsRectEmpty 82268->82271 82274 100054cc SelectObject DeleteDC 82269->82274 82270->82271 82273 10005187 IsIconic 82270->82273 82272 1000524a 82271->82272 82277 1000519b 82271->82277 82275 10005359 IsRectEmpty 82272->82275 82276 1000525d IsRectEmpty 82272->82276 82273->82277 82281 100054ea SelectObject 82274->82281 82279 1000538b GetSystemMenu GetMenuState 82275->82279 82282 10005280 82275->82282 82276->82275 82280 1000526c IsZoomed 82276->82280 82278 1000b6e0 6 API calls 82277->82278 82278->82272 82285 100053aa 82279->82285 82280->82282 82283 10005556 DeleteObject 82281->82283 82284 1000b6e0 6 API calls 82282->82284 82283->82257 82286 10005388 82284->82286 82287 1000b6e0 6 API calls 82285->82287 82286->82279 82288 10005433 IsRectEmpty 82287->82288 82288->82269 82289 10005447 SetBkMode 82288->82289 82290 1000545b 82289->82290 82291 1000b6e0 6 API calls 82290->82291 82291->82269 82293 100055b6 GetWindowRect SetRect GetWindowLongA 82292->82293 82303 10005068 SelectObject SetTextColor 82292->82303 82294 10005606 82293->82294 82295 10005808 SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty SetRectEmpty 82293->82295 82296 100056df SetRectEmpty SetRectEmpty 82294->82296 82298 10005663 82294->82298 82307 100057c4 82295->82307 82296->82298 82297 1000584d IsRectEmpty 82300 1000585a IsRectEmpty 82297->82300 82299 10005783 SetRectEmpty 82298->82299 82304 10005722 82298->82304 82299->82304 82302 100058a2 IsRectEmpty 82300->82302 82300->82303 82302->82303 82303->82265 82303->82267 82304->82307 82311 10025c70 SendMessageA 82304->82311 82307->82297 82307->82300 82308 100057b5 SetRectEmpty 82308->82307 82309->82252 82310->82249 82312 100057ab 82311->82312 82313 10025c89 SendMessageA 82311->82313 82312->82307 82312->82308 82313->82312 82314 10025c94 GetClassLongA 82313->82314 82314->82312 82315 10025ca1 SendMessageA 82314->82315 82315->82312 82316 682114 GetVersion 82348 68841c HeapCreate 82316->82348 82318 682172 82319 68217f 82318->82319 82320 682177 82318->82320 82360 6881d9 37 API calls __startOneArgErrorHandling 82319->82360 82368 682241 8 API calls _wctomb_s 82320->82368 82324 682184 82325 682188 82324->82325 82326 682190 82324->82326 82369 682241 8 API calls _wctomb_s 82325->82369 82361 68801d 34 API calls _wctomb_s 82326->82361 82330 68219a GetCommandLineA 82362 687eeb 37 API calls _wctomb_s 82330->82362 82332 6821aa 82370 687c9e 49 API calls _wctomb_s 82332->82370 82334 6821b4 82363 687be5 48 API calls _wctomb_s 82334->82363 82336 6821b9 82337 6821be GetStartupInfoA 82336->82337 82364 687b8d 48 API calls 82337->82364 82339 6821d0 82340 6821d9 82339->82340 82341 6821e2 GetModuleHandleA 82340->82341 82365 691baa 82341->82365 82345 6821fd 82372 687a15 36 API calls __startOneArgErrorHandling 82345->82372 82347 68220e 82349 68843c 82348->82349 82350 688472 82348->82350 82373 6882d4 57 API calls _wctomb_s 82349->82373 82350->82318 82352 688441 82353 688458 82352->82353 82354 68844b 82352->82354 82356 688475 82353->82356 82375 68c82c 5 API calls __startOneArgErrorHandling 82353->82375 82374 68bce5 HeapAlloc 82354->82374 82356->82318 82358 688455 82358->82356 82359 688466 HeapDestroy 82358->82359 82359->82350 82360->82324 82361->82330 82362->82332 82363->82336 82364->82339 82376 69b4b6 82365->82376 82370->82334 82371 686e09 32 API calls 82371->82345 82372->82347 82373->82352 82374->82358 82375->82358 82387 69a214 82376->82387 82379 69f5f5 28 API calls 82380 69b4c8 82379->82380 82392 6a04df SetErrorMode SetErrorMode 82380->82392 82384 6821f4 82384->82371 82385 69b4fd 82403 6a3d40 60 API calls _wctomb_s 82385->82403 82386 695070 31 API calls 82386->82385 82388 69f61b 28 API calls 82387->82388 82389 69a219 82388->82389 82390 69a225 82389->82390 82391 69f5f5 28 API calls 82389->82391 82390->82379 82391->82390 82393 69f5f5 28 API calls 82392->82393 82394 6a04f6 82393->82394 82395 69f5f5 28 API calls 82394->82395 82396 6a0505 82395->82396 82397 6a052b 82396->82397 82404 6a0542 82396->82404 82399 69f5f5 28 API calls 82397->82399 82400 6a0530 82399->82400 82401 69b4e0 82400->82401 82423 69a229 82400->82423 82401->82385 82401->82386 82403->82384 82405 69f5f5 28 API calls 82404->82405 82406 6a0555 GetModuleFileNameA 82405->82406 82407 684257 29 API calls 82406->82407 82408 6a0587 82407->82408 82434 6a065f lstrlenA lstrcpynA 82408->82434 82410 6a05a3 82411 6a05b9 82410->82411 82439 685b01 29 API calls _wctomb_s 82410->82439 82413 6a05f3 82411->82413 82435 69ad9c 82411->82435 82415 6a060b lstrcpyA 82413->82415 82416 6a0626 82413->82416 82441 685b01 29 API calls _wctomb_s 82415->82441 82417 6a0653 82416->82417 82418 6a0635 lstrcatA 82416->82418 82417->82397 82442 685b01 29 API calls _wctomb_s 82418->82442 82424 69f5f5 28 API calls 82423->82424 82425 69a22e 82424->82425 82433 69a286 82425->82433 82443 69f3c8 82425->82443 82428 69fc12 7 API calls 82429 69a264 82428->82429 82430 69a271 82429->82430 82431 69f5f5 28 API calls 82429->82431 82432 69fb7d 21 API calls 82430->82432 82431->82430 82432->82433 82433->82401 82434->82410 82436 69f5f5 28 API calls 82435->82436 82437 69ada2 LoadStringA 82436->82437 82438 69adbd 82437->82438 82440 685b01 29 API calls _wctomb_s 82438->82440 82439->82411 82440->82413 82441->82416 82442->82417 82444 69fb7d 21 API calls 82443->82444 82445 69a23a GetCurrentThreadId SetWindowsHookExA 82444->82445 82445->82428 82446 5e7820 82449 5e1260 82446->82449 82448 5e784f 82450 5e1275 82449->82450 82460 5e1333 82449->82460 82451 5e1290 82450->82451 82454 5e12a9 82450->82454 82461 5df690 132 API calls 82451->82461 82453 5e129f 82453->82448 82455 5e12d6 82454->82455 82458 5e12ef 82454->82458 82462 5df690 132 API calls 82455->82462 82457 5e12e5 82457->82448 82458->82460 82463 5df690 132 API calls 82458->82463 82460->82448 82461->82453 82462->82457 82463->82460 82464 696d57 82465 696d69 82464->82465 82466 696d64 82464->82466 82467 696cd2 57 API calls 82465->82467 82468 696d72 82467->82468 82469 696d8d DefWindowProcA 82468->82469 82470 696d7b 82468->82470 82469->82466 82471 696ae0 108 API calls 82470->82471 82471->82466 82472 5e7d20 RtlAllocateHeap 82473 5e7d40 82472->82473 82475 5e7d49 82472->82475 82476 5df650 133 API calls 82473->82476 82476->82475

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 283 10004e30-10004e88 GetWindowRect 284 10005585-1000559d 283->284 285 10004e8e-10004e90 283->285 285->284 286 10004e96-10004ebf call 100068c0 call 10006940 285->286 291 10004ec5-10004fc1 call 10006fb0 * 3 call 100068c0 call 10006940 286->291 292 1000556e-10005580 call 10006920 286->292 304 10004fc7-1000508d SelectObject SetBkMode call 10006fb0 call 1000b4c0 call 100055a0 SelectObject SetTextColor 291->304 305 1000555d-10005569 call 10006920 291->305 292->284 314 100050bf-100050ca 304->314 315 1000508f-100050bd DrawIconEx 304->315 305->292 316 100050eb-100050fe 314->316 317 100050cc-100050dd 314->317 315->316 319 10005100-10005103 316->319 320 10005116-10005161 GetWindowTextA DrawTextA 316->320 317->316 318 100050df-100050e5 317->318 318->316 321 10005105-1000510a 319->321 322 1000510c-1000510f 319->322 323 10005167-1000516c 320->323 324 1000549e-10005557 call 10006df0 SelectObject DeleteDC SelectObject DeleteObject 320->324 321->320 322->320 325 10005111 322->325 326 10005172-10005181 IsRectEmpty 323->326 327 1000521c-1000522b IsRectEmpty 323->327 324->305 325->320 326->327 331 10005187-10005199 IsIconic 326->331 329 1000524d-10005257 327->329 330 1000522d-10005241 327->330 334 10005359-10005368 IsRectEmpty 329->334 335 1000525d-10005266 IsRectEmpty 329->335 333 10005242-1000524a call 1000b6e0 330->333 336 1000519b-1000519e 331->336 337 100051dd-100051e0 331->337 333->329 339 1000536a-10005381 334->339 340 1000538b-100053a8 GetSystemMenu GetMenuState 334->340 335->334 341 1000526c-1000527e IsZoomed 335->341 342 100051a0-100051b5 336->342 343 100051ba-100051cd 336->343 344 100051e2-100051f7 337->344 345 100051f9-1000520c 337->345 348 10005382-10005388 call 1000b6e0 339->348 349 100053c1-100053ca 340->349 350 100053aa-100053bf 340->350 351 10005280-10005283 341->351 352 100052f1-100052f4 341->352 342->333 353 100051d6-100051db 343->353 354 100051cf-100051d4 343->354 344->333 355 10005215-1000521a 345->355 356 1000520e-10005213 345->356 348->340 359 100053eb-100053ee 349->359 360 100053cc-100053e9 349->360 361 10005425-1000542c 350->361 362 10005285-100052a3 351->362 363 100052a8-100052ab 351->363 364 10005316-10005319 352->364 365 100052f6-10005314 352->365 353->333 354->333 355->333 356->333 370 10005410-10005424 359->370 371 100053f0-1000540e 359->371 368 1000542d-10005445 call 1000b6e0 IsRectEmpty 360->368 361->368 362->348 372 100052ad-100052ca 363->372 373 100052cf-100052ec 363->373 366 1000533a-10005357 364->366 367 1000531b-10005338 364->367 365->348 366->348 367->348 368->324 376 10005447-10005459 SetBkMode 368->376 370->361 371->368 372->348 373->348 377 10005472-10005485 376->377 378 1000545b-10005470 376->378 380 10005487-1000548c 377->380 381 1000548e 377->381 379 10005493-1000549b call 1000b6e0 378->379 379->324 380->379 381->379
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 10004E5F
                                • SelectObject.GDI32(00000000,?), ref: 10004FDD
                                • SetBkMode.GDI32(00000000,00000001), ref: 10004FE6
                                  • Part of subcall function 1000B4C0: 74001530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
                                  • Part of subcall function 100055A0: GetWindowRect.USER32(?,?), ref: 100055C2
                                  • Part of subcall function 100055A0: SetRect.USER32(?,00000000,00000000,?,0000001D), ref: 100055E3
                                  • Part of subcall function 100055A0: GetWindowLongA.USER32(?,000000F0), ref: 100055EF
                                • SelectObject.GDI32(00000000,?), ref: 10005076
                                • SetTextColor.GDI32(00000000,00FFFFFF), ref: 1000507F
                                • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 100050B7
                                • GetWindowTextA.USER32(?,?,00000400), ref: 10005127
                                • DrawTextA.USER32(00000000,?,?,?,00040024), ref: 10005150
                                • IsRectEmpty.USER32(?), ref: 10005179
                                • IsIconic.USER32(?), ref: 1000518B
                                • IsRectEmpty.USER32(?), ref: 1000525E
                                • IsZoomed.USER32(?), ref: 10005270
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 10005398
                                • GetMenuState.USER32(00000000), ref: 1000539F
                                • IsRectEmpty.USER32(?), ref: 1000543D
                                • SetBkMode.GDI32(00000000,00000001), ref: 1000544A
                                • SelectObject.GDI32(00000000,?), ref: 100054D5
                                • DeleteDC.GDI32(00000000), ref: 100054DC
                                • SelectObject.GDI32(00000000,?), ref: 100054F5
                                • DeleteObject.GDI32(00000000), ref: 10005557
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Object$SelectWindow$EmptyText$DeleteDrawMenuMode$74001530ColorIconIconicLongStateSystemZoomed
                                • String ID:
                                • API String ID: 1340932111-0
                                • Opcode ID: 74803d5d351751038353616b3efeb5d9278749a19af42b1450ece1d2114deb8e
                                • Instruction ID: 250533d8752f0109e71349a667642d75282f207753a39658d14e2e8158d14daf
                                • Opcode Fuzzy Hash: 74803d5d351751038353616b3efeb5d9278749a19af42b1450ece1d2114deb8e
                                • Instruction Fuzzy Hash: DF227B79240205AFF324CB64CC89FAB77A9FF84745F20491CF95A87295EA71B906CB60

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 546 10017540-10017566 547 10017b84-10017b93 546->547 548 1001756c-10017575 546->548 548->547 549 1001757b-1001757e 548->549 550 10017584-10017588 549->550 551 1001760f-1001761e 549->551 550->551 552 1001758e-10017592 550->552 552->551 553 10017594-10017598 552->553 553->551 554 1001759a-1001759f 553->554 555 100175a1-100175a5 554->555 556 100175b9-100175cf call 10001020 554->556 555->556 557 100175a7-100175b6 555->557 560 100175d1-100175e0 556->560 561 100175e3-100175fa ??2@YAPAXI@Z call 10001030 556->561 563 100175ff-10017604 561->563 564 10017621-1001765e 563->564 565 10017606-1001760c ??3@YAXPAX@Z 563->565 566 10017660-10017662 564->566 567 10017665-10017667 564->567 565->551 566->567 568 10017700-100177b7 567->568 569 1001766d-10017692 567->569 570 100177b9 568->570 571 100177bb-100177dc 568->571 572 10017694-100176ac ??3@YAXPAX@Z 569->572 573 100176af-100176da call 1000f6d0 569->573 570->571 574 100177e0-10017805 571->574 575 100177de 571->575 581 100176e1-100176e3 573->581 582 100176dc-100176de 573->582 577 10017810 574->577 578 10017807-1001780e 574->578 575->574 580 10017813-10017846 577->580 578->580 584 10017848 580->584 585 1001784a-10017882 580->585 581->568 583 100176e5-100176fd ??3@YAXPAX@Z 581->583 582->581 584->585 586 10017884-10017887 585->586 587 10017889 585->587 588 1001788c-100178c5 586->588 587->588 589 100178c7-100178cd 588->589 590 100178cf-100178d2 588->590 591 100178d5-10017a14 call 10006b30 589->591 590->591 594 10017a1a-10017ac9 ??3@YAXPAX@Z 591->594 595 10017acc-10017af4 ??3@YAXPAX@Z SelectObject 591->595 596 10017b04-10017b81 SelectObject * 2 call 10018e00 call 10018f60 call 10020d90 call 100191c0 595->596 597 10017af6-10017afd DeleteObject 595->597 597->596
                                APIs
                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 100175E4
                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,00000000), ref: 10017607
                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10017695
                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,-00000001,00000000), ref: 100176E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$??2@
                                • String ID: s
                                • API String ID: 4113381792-453955339
                                • Opcode ID: bf304b2523dd7e7a9fcd96391148d76558a07603fedb0a44f7bae8e4334ac867
                                • Instruction ID: 33afa64b527c78f8bd4c2c7d176e8c765b8c94169a76a89671ef6ae364567c8b
                                • Opcode Fuzzy Hash: bf304b2523dd7e7a9fcd96391148d76558a07603fedb0a44f7bae8e4334ac867
                                • Instruction Fuzzy Hash: 8502D0756002488FDB28CF14D890BEA77E2FB88310F59857DED0A5F381DB75AA45CB91
                                APIs
                                • ??2@YAPAXI@Z.MSVCRT(00000008,?,1002CDA8,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020), ref: 100039AB
                                • ??2@YAPAXI@Z.MSVCRT(?,00000008,?,1002CDA8,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020), ref: 100039BD
                                • PtInRegion.GDI32(?,00000000,00000000,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020), ref: 10003A4F
                                • PtInRegion.GDI32(?,?,00000000,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020), ref: 10003AB3
                                • ??2@YAPAXI@Z.MSVCRT(00000008,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020,00000008), ref: 10003B14
                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020,00000008), ref: 10003C36
                                • _ftol.MSVCRT ref: 10003D2F
                                • OffsetRgn.GDI32(?,00000008,00000008), ref: 10004038
                                • PtInRegion.GDI32(?,-00000001,00000009,?,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000), ref: 100041D4
                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020,00000008), ref: 1000428E
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020,00000020), ref: 10004298
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000,00000020), ref: 100042A2
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,1002CDC8,?,?,?,?,?,?,100032B1,02820000,00000000), ref: 100042AC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??2@??3@$Region$Offset_ftol
                                • String ID:
                                • API String ID: 2490806229-0
                                • Opcode ID: 5ee772813303892243ec62a05ff9d7b80bfa317d3e0f66a58c869604295b2c38
                                • Instruction ID: 98ed0c605d52677ada83a984198e756a1aca9b3409a824ef284006b387393d3d
                                • Opcode Fuzzy Hash: 5ee772813303892243ec62a05ff9d7b80bfa317d3e0f66a58c869604295b2c38
                                • Instruction Fuzzy Hash: F3626975A086468FD709CF19C88051AB7E6FFC8384F15C92DE899DB359EB30E946CB81

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 906 5df2b0-5df2d5 907 5df2db-5df2e6 906->907 908 5df375-5df384 906->908 909 5df2e8-5df2f2 907->909 910 5df2f5-5df2f8 907->910 911 5df639-5df64a 908->911 912 5df38a-5df39a 908->912 909->910 913 5df30d 910->913 914 5df2fa-5df30b call 682da8 910->914 915 5df39c-5df3a6 call 682da8 912->915 916 5df3ab-5df3c8 call 5c4b00 912->916 919 5df30f-5df321 GetProcAddress 913->919 914->919 915->916 927 5df3ce-5df3e1 call 683f30 916->927 928 5df4e1 916->928 921 5df358-5df372 call 5df290 919->921 922 5df323-5df353 call 5e9170 call 5df690 call 695203 919->922 922->921 941 5df4ac-5df4b3 LoadLibraryA 927->941 942 5df3e7-5df3f8 927->942 930 5df4e6-5df4f4 LoadLibraryA 928->930 934 5df4f6-5df504 GetProcAddress 930->934 935 5df531-5df53a 930->935 938 5df51c-5df526 934->938 939 5df506-5df511 934->939 935->930 943 5df53c-5df547 935->943 938->943 945 5df528-5df52f FreeLibrary 938->945 939->938 944 5df513-5df519 939->944 941->943 951 5df4b9-5df4c7 GetProcAddress 941->951 947 5df3fa-5df418 call 69544c LoadLibraryA call 695203 942->947 948 5df422-5df457 call 69544c * 2 LoadLibraryA call 695203 942->948 949 5df54d-5df54f 943->949 950 5df616-5df618 943->950 944->938 945->935 947->951 973 5df41e 947->973 975 5df45c-5df46f call 695203 948->975 953 5df558-5df567 call 5c4b00 949->953 954 5df551-5df552 FreeLibrary 949->954 956 5df61a-5df625 950->956 957 5df630-5df636 950->957 951->943 958 5df4c9-5df4d4 951->958 968 5df569-5df5bd call 5e9170 call 5df690 call 695203 953->968 969 5df5c0-5df613 call 5e9170 call 5df690 call 695203 953->969 954->953 956->957 962 5df627-5df62d 956->962 957->911 958->943 963 5df4d6-5df4df 958->963 962->957 963->943 973->948 975->951 985 5df471-5df482 975->985 988 5df4a4-5df4a6 985->988 989 5df484-5df49f call 69544c LoadLibraryA call 695203 985->989 988->951 992 5df4a8 988->992 989->988 992->941
                                APIs
                                • GetProcAddress.KERNEL32(00000000,008AC7CC), ref: 005DF317
                                • LoadLibraryA.KERNEL32(?,?,008BD238), ref: 005DF409
                                • LoadLibraryA.KERNEL32(?,?), ref: 005DF44F
                                • LoadLibraryA.KERNEL32(?,?,008BD140,00000001), ref: 005DF497
                                • LoadLibraryA.KERNEL32(00000001), ref: 005DF4AD
                                • GetProcAddress.KERNEL32(00000000,?), ref: 005DF4BF
                                • FreeLibrary.KERNEL32(00000000), ref: 005DF552
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Library$Load$AddressProc$Free
                                • String ID:
                                • API String ID: 3120990465-0
                                • Opcode ID: d3e44936ee72fe73960de709d645e2c4300a4880ae86c5046db1bd3c7078d3f4
                                • Instruction ID: 91a5f07175987a1e1c18ca2140ad0b01eec33d3e6c4a362a14abdb73cb8d51f4
                                • Opcode Fuzzy Hash: d3e44936ee72fe73960de709d645e2c4300a4880ae86c5046db1bd3c7078d3f4
                                • Instruction Fuzzy Hash: B0A1B0B1600702ABDB24EF68D885B6BB7E9FF95310F044A2EF85697341DB34E905CB91
                                APIs
                                • GetPropA.USER32(?,SHE_F), ref: 1002137E
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1002139A
                                • IsWindowVisible.USER32(?), ref: 100213D9
                                • ShowWindow.USER32(?,00000000), ref: 100213E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$NtdllProc_PropShowVisible
                                • String ID: SHE_F
                                • API String ID: 2900772547-872208577
                                • Opcode ID: 1dd075973b18bd4a155f3fa5b72aa87e198f8b617cdb39295f7a88e0023e63e6
                                • Instruction ID: bd9fa984eed261b426f55b418d79167bb0f56a7a5cd861e89bf77d4c9bc891ea
                                • Opcode Fuzzy Hash: 1dd075973b18bd4a155f3fa5b72aa87e198f8b617cdb39295f7a88e0023e63e6
                                • Instruction Fuzzy Hash: 9531E97B301659ABE211DA95ECC4DBFB7ADEBD53D6F01841AF24187100C722AD06C775
                                APIs
                                • __EH_prolog.LIBCMT ref: 00695CC0
                                • GetFullPathNameA.KERNEL32(?,00000104,?,?,?,?), ref: 00695CDE
                                • lstrcpynA.KERNEL32(?,?,00000104), ref: 00695CED
                                • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00695D21
                                • CharUpperA.USER32(?), ref: 00695D32
                                • FindFirstFileA.KERNEL32(?,?), ref: 00695D48
                                • FindClose.KERNEL32(00000000), ref: 00695D54
                                • lstrcpyA.KERNEL32(?,?), ref: 00695D64
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Find$CharCloseFileFirstFullH_prologInformationNamePathUpperVolumelstrcpylstrcpyn
                                • String ID:
                                • API String ID: 304730633-0
                                • Opcode ID: 840fa8a9e5f2fab8aff3dda57d2966f193118ebfa50041f5a8033bff99f5d509
                                • Instruction ID: 41fcf5fdae77b6e1528d323db8b0152a093489533f47baa2aad45619b4f70e9f
                                • Opcode Fuzzy Hash: 840fa8a9e5f2fab8aff3dda57d2966f193118ebfa50041f5a8033bff99f5d509
                                • Instruction Fuzzy Hash: 06219A31901518ABDF21AFA4DC48EEF7FBEEF46760F004125F91AE2160D7309A49CBA0
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001D8EC
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001D908
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: e4a0d490164f6d9069ce7e86964c5195bdc24712ecee0d29021a28e2da7046a5
                                • Instruction ID: 3dd76a049db869770da15870645d9af25493a0817101984a39104c73db85ad87
                                • Opcode Fuzzy Hash: e4a0d490164f6d9069ce7e86964c5195bdc24712ecee0d29021a28e2da7046a5
                                • Instruction Fuzzy Hash: D741447A7082119BD640FE58E880E6F77A9EBD4750F108C1BF5818B256C270DCC697B2
                                APIs
                                  • Part of subcall function 0068AAE4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00684C68,00000009,00000000,00000000,00000001,00688265,00000001,00000074,?,?,00000000,00000001), ref: 0068AB21
                                  • Part of subcall function 0068AAE4: EnterCriticalSection.KERNEL32(?,?,?,00684C68,00000009,00000000,00000000,00000001,00688265,00000001,00000074,?,?,00000000,00000001), ref: 0068AB3C
                                  • Part of subcall function 0068AB45: LeaveCriticalSection.KERNEL32(?,00683B02,00000009,00683AEE,00000000,?,00000000,00000000,00000000), ref: 0068AB52
                                • GetTimeZoneInformation.KERNEL32(0000000C,?,?,?,0000000B,0000000B,?,0068F4CD,0068F19E,?,?,?,?,006858EE,?,?), ref: 0068F52A
                                • WideCharToMultiByte.KERNEL32(00000220,Eastern Standard Time,000000FF,0000003F,00000000,?,?,0068F4CD,0068F19E,?,?,?,?,006858EE,?,?), ref: 0068F5C0
                                • WideCharToMultiByte.KERNEL32(00000220,Eastern Summer Time,000000FF,0000003F,00000000,?,?,0068F4CD,0068F19E,?,?,?,?,006858EE,?,?), ref: 0068F5F9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CriticalSection$ByteCharMultiWide$EnterInformationInitializeLeaveTimeZone
                                • String ID: Eastern Standard Time$Eastern Summer Time
                                • API String ID: 3442286286-239921721
                                • Opcode ID: 4092b80a3a7e0834d3197a5ab0d869d58d70eb4fd1ba7c7f6bb7c36a093ef760
                                • Instruction ID: 6d37b88354831b3375eb8af3045f3c0f2f159536a5e963eb4d9b999f2e559e68
                                • Opcode Fuzzy Hash: 4092b80a3a7e0834d3197a5ab0d869d58d70eb4fd1ba7c7f6bb7c36a093ef760
                                • Instruction Fuzzy Hash: 5361F4715042659FEB31BF28EC41B6A7BAAFB05310F24173EF485972E2E7708982DB15
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10007A3D
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,?,?,100065A9,?,?,?,?), ref: 10007A59
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: cb2a118e651b28c30f67082bd4fe69c13c495138cac0e45b77bb26f8af636f3a
                                • Instruction ID: 97ae2f1b3464a4c4e6a23b637a735b9b026802ad9d4f48c1e8d21a1d89c5b290
                                • Opcode Fuzzy Hash: cb2a118e651b28c30f67082bd4fe69c13c495138cac0e45b77bb26f8af636f3a
                                • Instruction Fuzzy Hash: BA415F767041019BE204DB58E8D4DBFB3A9EBD83A1F10882FF585C3256CB74AC5697B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000D33D
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000D359
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 7c525df14ed70a4f11c4a69d41a52e97dcc25fc77dcc8a51e8dfaffd4d0c7820
                                • Instruction ID: 3cad35e25735ce33caab85577b29180f6f89a3b7f1056cd299d0b253d523294e
                                • Opcode Fuzzy Hash: 7c525df14ed70a4f11c4a69d41a52e97dcc25fc77dcc8a51e8dfaffd4d0c7820
                                • Instruction Fuzzy Hash: 9C21B5B7700111ABE200EA58D8D8DAFF7ADEBD42A1F10852BF54187286C770DC46D7B2
                                APIs
                                • GetLocalTime.KERNEL32(?), ref: 0068582D
                                • GetSystemTime.KERNEL32(?), ref: 00685837
                                • GetTimeZoneInformation.KERNEL32(?), ref: 0068588C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Time$InformationLocalSystemZone
                                • String ID:
                                • API String ID: 2475273158-0
                                • Opcode ID: e4eedb9b7f1ac0439ec66852dedb341c0b2eafb578c227029171888a539acae8
                                • Instruction ID: dda69a8002394cfccac9fe21bc7792bccba5153a249c43cd0477cf672116a4a4
                                • Opcode Fuzzy Hash: e4eedb9b7f1ac0439ec66852dedb341c0b2eafb578c227029171888a539acae8
                                • Instruction Fuzzy Hash: 722144A9804529E9DF25BF98DC046FE73BAEF09711F500612F916E62D0E3348DC2DB65
                                APIs
                                • __EH_prolog.LIBCMT ref: 00697B56
                                • GetVersion.KERNEL32(00000007,?,?,00000000,00000000,?,0000C000,00000000,00000000,00000007), ref: 00697D09
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: H_prologVersion
                                • String ID:
                                • API String ID: 1836448879-0
                                • Opcode ID: 86fa2655353d4863f7ef8e9d5c2729b4fb36d9c2edf4015af410956e13206e59
                                • Instruction ID: 79994b65bd1808b2590f2d8b1c58f2f5b11ab06879147e89de4fd7dd5f3a510c
                                • Opcode Fuzzy Hash: 86fa2655353d4863f7ef8e9d5c2729b4fb36d9c2edf4015af410956e13206e59
                                • Instruction Fuzzy Hash: 74E13970618219EFDF14DF64C881EBE77AEEF04310F108559F816AAA91DB35EE01DB68
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 42ba949ed5f13f7a13048d0cd2647f30b782fffce83c0990f55e93fa41166377
                                • Instruction ID: 870b280583b2247d15a19da4ad626146278f649596d15c5dcdf4736055d4b433
                                • Opcode Fuzzy Hash: 42ba949ed5f13f7a13048d0cd2647f30b782fffce83c0990f55e93fa41166377
                                • Instruction Fuzzy Hash: 5D21F4B6600B019FE720DFA9E884F56BBE8FBA4365B14C92EE195C7210E371E845CB50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 1000d410-1000d423 1 1000d430-1000d48a GetWindowRect OffsetRect call 1000c1c0 SelectClipRgn DeleteObject call 10009a50 0->1 2 1000d425-1000d42e call 10009b10 0->2 9 1000d4e7-1000d52d GetWindowTextA 1->9 10 1000d48c-1000d49d GetPropA 1->10 2->1 11 1000d533-1000d54a SendMessageA 9->11 12 1000d6ab-1000d6b0 9->12 13 1000d4b9-1000d4e1 SelectObject PatBlt 10->13 14 1000d49f-1000d4b7 call 1000b0c0 10->14 17 1000da00-1000da10 IsWindowEnabled 11->17 18 1000d550-1000d596 GetIconInfo GetObjectA 11->18 15 1000d811-1000d823 12->15 16 1000d6b6-1000d6cf SendMessageA 12->16 13->9 14->9 25 1000d829-1000d8a4 call 10012060 SelectObject SetBkMode DrawTextA 15->25 26 1000d9fb 15->26 16->17 22 1000d6d5-1000d71d GetObjectA SelectObject SetRect 16->22 20 1000da12-1000da19 17->20 21 1000da1b-1000da21 17->21 23 1000d598-1000d5aa 18->23 24 1000d5ac-1000d5b9 18->24 28 1000da22-1000da37 call 10007f00 20->28 21->28 39 1000d733-1000d741 22->39 40 1000d71f-1000d731 22->40 29 1000d5d3-1000d5ed OffsetRect 23->29 30 1000d5bb-1000d5ca 24->30 31 1000d5cc-1000d5d2 24->31 41 1000d8a6-1000d8b4 25->41 42 1000d8b8-1000d8c4 IsWindowEnabled 25->42 26->17 36 1000d627-1000d6a6 DrawIconEx DeleteObject * 2 BeginPath Rectangle EndPath SelectClipPath 29->36 37 1000d5ef-1000d60a IsWindowEnabled 29->37 30->29 31->29 36->17 43 1000d613 37->43 44 1000d60c-1000d611 37->44 46 1000d743-1000d756 39->46 47 1000d758 39->47 45 1000d75a-1000d75e 40->45 41->42 48 1000d8c6-1000d8d6 42->48 49 1000d8d8-1000d8e9 GetPropA 42->49 50 1000d618-1000d624 call 1000b6e0 43->50 44->50 51 1000d75f-1000d779 OffsetRect 45->51 46->51 47->45 52 1000d8fe-1000d913 SetTextColor 48->52 53 1000d8eb-1000d8ec 49->53 54 1000d8ee-1000d8fd 49->54 50->36 58 1000d7b3-1000d808 DeleteDC BeginPath 51->58 59 1000d77b-1000d796 IsWindowEnabled 51->59 56 1000d915-1000d927 52->56 57 1000d929-1000d937 52->57 53->52 54->52 61 1000d950-1000d954 56->61 62 1000d939-1000d94c 57->62 63 1000d94e 57->63 58->15 64 1000d798-1000d79d 59->64 65 1000d79f 59->65 66 1000d955-1000d96f OffsetRect 61->66 62->66 63->61 68 1000d7a4-1000d7b0 call 1000b6e0 64->68 65->68 69 1000d971-1000d98c IsWindowEnabled 66->69 70 1000d9ab-1000d9f5 DrawTextA BeginPath 66->70 68->58 73 1000d996 69->73 74 1000d98e-1000d994 69->74 70->26 75 1000d99c-1000d9a8 call 1000b6e0 73->75 74->75 75->70
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 1000D43B
                                • OffsetRect.USER32(?,?,?), ref: 1000D454
                                • SelectClipRgn.GDI32(?,00000000), ref: 1000D46A
                                • DeleteObject.GDI32(00000000), ref: 1000D471
                                • GetPropA.USER32(?,SHE_H), ref: 1000D495
                                • SelectObject.GDI32(?,?), ref: 1000D4C7
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 1000D4E1
                                • GetWindowTextA.USER32(?,?,00000400), ref: 1000D4F5
                                • SendMessageA.USER32(?,000000F6,00000001,00000000), ref: 1000D540
                                • GetIconInfo.USER32(00000000,?), ref: 1000D556
                                • GetObjectA.GDI32(?,00000018,?), ref: 1000D568
                                • OffsetRect.USER32(?,0000000A,00000000), ref: 1000D5D3
                                • IsWindowEnabled.USER32(?), ref: 1000D5F3
                                • DrawIconEx.USER32(?,?,?,00000000,?,?,00000000,00000000,00000003), ref: 1000D643
                                • DeleteObject.GDI32(?), ref: 1000D654
                                • DeleteObject.GDI32(?), ref: 1000D65B
                                • BeginPath.GDI32(?), ref: 1000D671
                                • Rectangle.GDI32(?,?,?,?,?), ref: 1000D690
                                • EndPath.GDI32(?), ref: 1000D697
                                • SelectClipPath.GDI32(?,00000004), ref: 1000D6A0
                                • SendMessageA.USER32(?,000000F6,00000000,00000000), ref: 1000D6C3
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 1000D6DD
                                • SelectObject.GDI32(00000000,?), ref: 1000D6F2
                                • SetRect.USER32(?,00000000,00000000,?,?), ref: 1000D70B
                                • OffsetRect.USER32(?,0000000A,00000000), ref: 1000D75F
                                • IsWindowEnabled.USER32(?), ref: 1000D77F
                                • 73F84D40.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 1000D7D2
                                • DeleteDC.GDI32(00000000), ref: 1000D7D9
                                • BeginPath.GDI32(?), ref: 1000D7F3
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • SelectObject.GDI32(?,00000000), ref: 1000D834
                                • SetBkMode.GDI32(?,00000001), ref: 1000D83D
                                • DrawTextA.USER32(?,?,?), ref: 1000D87C
                                • IsWindowEnabled.USER32(?), ref: 1000D8BC
                                • GetPropA.USER32(?,SHE_G), ref: 1000D8E1
                                • SetTextColor.GDI32(?,?), ref: 1000D8FF
                                • OffsetRect.USER32(?,0000000A,00000000), ref: 1000D955
                                • IsWindowEnabled.USER32(?), ref: 1000D975
                                • DrawTextA.USER32(?,?,000000FF,?,00000025), ref: 1000D9D3
                                • BeginPath.GDI32(?), ref: 1000D9D6
                                • IsWindowEnabled.USER32(?), ref: 1000DA04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Window$Rect$EnabledPathSelect$DeleteOffsetText$BeginDrawMessagePropSend$ClipIcon$ColorInfoModeRectangle
                                • String ID: SHE_G$SHE_H$s
                                • API String ID: 2187885752-296884359
                                • Opcode ID: 6fddeaad0acca133993aa1c44a543fc9cad7247503c1493824e52e6b78b187c0
                                • Instruction ID: 50004852f72fae0a29118b72576feac184e73b219f1c45ddea06c1ed47f32cb6
                                • Opcode Fuzzy Hash: 6fddeaad0acca133993aa1c44a543fc9cad7247503c1493824e52e6b78b187c0
                                • Instruction Fuzzy Hash: 88026A79205301AFE344DF64CC88F6FB7E9EBC8744F108A1DF94597294DA74EA058B62

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 78 1001dd00-1001de58 GetClientRect SelectObject SetBkMode SelectObject PatBlt GetStockObject SelectObject SetBkMode SetTextColor IsWindowEnabled SendMessageA * 2 call 10009a50 call 10012060 GetObjectA 85 1001de77 78->85 86 1001de5a-1001de75 78->86 87 1001de7b-1001ded4 CreateFontIndirectA SelectObject SendMessageA * 2 85->87 86->87 88 1001e019-1001e01b 87->88 89 1001deda-1001dede 87->89 92 1001e021-1001e027 88->92 93 1001e27a-1001e295 SetRectEmpty 88->93 90 1001e4a4-1001e4fb SelectObject DeleteDC DeleteObject * 2 89->90 91 1001dee4 89->91 94 1001deea-1001df10 SetRectEmpty SendMessageA 91->94 95 1001e152-1001e166 92->95 96 1001e02d-1001e057 SetRectEmpty SendMessageA 92->96 97 1001e3a7-1001e3b9 93->97 98 1001e29b-1001e2c5 SetRectEmpty SendMessageA 93->98 99 1001e007-1001e00e 94->99 100 1001df16-1001df20 94->100 104 1001e170 95->104 105 1001e168-1001e16e 95->105 102 1001e145-1001e14c 96->102 103 1001e05d-1001e067 96->103 106 1001e3c3 97->106 107 1001e3bb-1001e3c1 97->107 108 1001e2cb-1001e2d5 98->108 109 1001e39a-1001e3a1 98->109 99->94 110 1001e014 99->110 111 1001df22-1001df33 100->111 112 1001df3d-1001df4e 100->112 102->95 102->96 113 1001e081-1001e085 103->113 114 1001e069-1001e07d 103->114 115 1001e176-1001e192 call 1000b6e0 IsRectEmpty 104->115 105->115 116 1001e3c9-1001e3e5 call 1000b6e0 IsRectEmpty 106->116 107->116 117 1001e2d7-1001e2db 108->117 118 1001e2ff-1001e309 108->118 109->97 109->98 110->90 124 1001df35-1001df3b 111->124 125 1001df58 111->125 112->125 126 1001df50-1001df56 112->126 127 1001e0e2-1001e0e6 113->127 128 1001e087-1001e08b 113->128 114->113 115->90 143 1001e198-1001e1b1 InflateRect 115->143 116->90 139 1001e3eb-1001e404 InflateRect 116->139 120 1001e2e1-1001e2fd 117->120 121 1001e2dd 117->121 122 1001e30b 118->122 123 1001e30f-1001e32a 118->123 133 1001e32f-1001e344 call 1000b6e0 120->133 121->120 122->123 123->133 134 1001df5e-1001df76 call 1000b6e0 124->134 125->134 126->134 130 1001e0e8 127->130 131 1001e0ec-1001e139 call 1000b6e0 127->131 135 1001e091-1001e0e0 call 1000b6e0 128->135 136 1001e08d 128->136 130->131 154 1001e13c-1001e140 call 1001e500 131->154 157 1001e346-1001e366 133->157 158 1001e368-1001e395 call 1001e500 133->158 159 1001dfa3-1001dfa8 134->159 160 1001df78-1001dfa1 134->160 135->154 136->135 145 1001e406 139->145 146 1001e40a-1001e414 139->146 150 1001e1b3 143->150 151 1001e1b7-1001e1c1 143->151 145->146 155 1001e416 146->155 156 1001e41a-1001e424 146->156 150->151 152 1001e1c3 151->152 153 1001e1c7-1001e1d1 151->153 152->153 161 1001e1d3 153->161 162 1001e1d7-1001e1e1 153->162 154->102 155->156 164 1001e426 156->164 165 1001e42a-1001e434 156->165 157->109 158->109 168 1001dfd5-1001dffb 159->168 169 1001dfaa-1001dfd3 159->169 167 1001dffe-1001e002 call 1001e500 160->167 161->162 171 1001e1e3 162->171 172 1001e1e7-1001e1f8 162->172 164->165 173 1001e436 165->173 174 1001e43a-1001e44f 165->174 167->99 168->167 169->167 171->172 175 1001e23a-1001e275 call 1000b6e0 172->175 176 1001e1fa-1001e235 call 1000b6e0 172->176 173->174 177 1001e451-1001e457 174->177 178 1001e459 174->178 185 1001e494-1001e49f call 1001e500 175->185 176->185 181 1001e45f-1001e491 call 1000b6e0 177->181 178->181 181->185 185->90
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1001DD15
                                • SelectObject.GDI32(00000000,00000000), ref: 1001DD48
                                • SetBkMode.GDI32(00000000,00000001), ref: 1001DD57
                                • SelectObject.GDI32(00000000,?), ref: 1001DD67
                                • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1001DD7D
                                • GetStockObject.GDI32(00000005), ref: 1001DD85
                                • SelectObject.GDI32(00000000,00000000), ref: 1001DD8D
                                • SetBkMode.GDI32(00000000,00000001), ref: 1001DD92
                                • SetTextColor.GDI32(00000000,?), ref: 1001DDA8
                                • IsWindowEnabled.USER32(?), ref: 1001DDB2
                                • SendMessageA.USER32(?,00001328,00000000,?), ref: 1001DE08
                                • SendMessageA.USER32(?,00001302,00000000,00000000), ref: 1001DE17
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • GetObjectA.GDI32(00000000), ref: 1001DE4A
                                • CreateFontIndirectA.GDI32(?), ref: 1001DE91
                                • SelectObject.GDI32(00000000,00000000), ref: 1001DE9D
                                • SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 1001DEB0
                                • SendMessageA.USER32(?,00001304,00000000,00000000), ref: 1001DEC7
                                • SetRectEmpty.USER32(?), ref: 1001DEEF
                                • SendMessageA.USER32(?,0000130A,00000000,?), ref: 1001DF00
                                • SetRectEmpty.USER32(?), ref: 1001E032
                                • SendMessageA.USER32(?,0000130A,00000000,?), ref: 1001E047
                                • IsRectEmpty.USER32(?), ref: 1001E18A
                                • InflateRect.USER32(?,00000002,00000002), ref: 1001E1A1
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 1001E4C4
                                • SelectObject.GDI32(00000000,?), ref: 1001E4D0
                                • DeleteDC.GDI32(00000000), ref: 1001E4D7
                                • DeleteObject.GDI32(?), ref: 1001E4E8
                                • DeleteObject.GDI32(?), ref: 1001E4EF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$MessageSend$RectSelect$DeleteEmpty$Mode$ClientColorCreateEnabledFontIndirectInflatePropStockTextWindow
                                • String ID: s
                                • API String ID: 2090088722-453955339
                                • Opcode ID: 97f9f2643606517d4a72aba39ad4632b4258dedb9dc8ca265b39ff01b36e7c9f
                                • Instruction ID: be54d6abef2699d98cadc2507b809e01c9902be56bffb49cbb06b1a11f8f3968
                                • Opcode Fuzzy Hash: 97f9f2643606517d4a72aba39ad4632b4258dedb9dc8ca265b39ff01b36e7c9f
                                • Instruction Fuzzy Hash: 6D4224B4609341AFE304DF58C885E6ABBE9FF88744F10892DF5898B391D770E985CB52

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 188 10013170-10013206 GetClientRect call 1000fbf0 call 10012060 SelectObject call 10009a50 IsWindowEnabled 196 10013291-100132a0 188->196 197 1001320c-10013212 188->197 200 100132a6-100132b0 196->200 198 10013214-10013229 197->198 199 1001322b-1001322e 197->199 198->200 201 10013251-10013261 GetFocus 199->201 202 10013230-1001324f 199->202 203 100132b1-1001333b call 1000b6e0 InflateRect GetWindowTextA 200->203 204 10013263-10013273 201->204 205 10013275-1001328f 201->205 202->203 208 10013341-10013355 SendMessageA 203->208 209 1001340a-1001340d 203->209 204->200 205->203 210 100133f0-10013405 208->210 211 1001335b-1001335d 208->211 212 10013413-10013428 SendMessageA 209->212 213 100134ac-100134ae 209->213 210->213 211->210 214 10013363-100133ee GetIconInfo GetObjectA GetTextExtentPointA DeleteObject * 2 211->214 215 10013497-100134a7 212->215 216 1001342a-1001342c 212->216 217 100134b4-100134c8 213->217 218 10013669-100136bf call 1000fc70 213->218 214->210 215->213 216->215 220 1001342e-10013493 GetObjectA GetTextExtentPointA 216->220 221 100134d4-100134d7 217->221 222 100134ca-100134d3 217->222 220->215 224 100134dd-10013536 DrawTextA 221->224 225 1001359c-100135a5 221->225 222->221 226 10013538-1001354c 224->226 227 1001354e-10013554 224->227 229 100135b7-100135c8 GetPropA 225->229 230 100135a7-100135ad 225->230 226->229 231 10013556-1001356a 227->231 232 1001356c-1001359a 227->232 236 100135ca-100135cb 229->236 237 100135cd-100135d9 IsWindowEnabled 229->237 234 100135b4 230->234 235 100135af-100135b2 230->235 231->229 232->229 234->229 235->229 238 10013602-10013606 236->238 239 100135f2-10013601 237->239 240 100135db-100135f0 237->240 241 10013607-10013611 SetTextColor 238->241 239->238 240->241 242 10013631-10013663 SetBkMode DrawTextA 241->242 243 10013613-1001362b OffsetRect 241->243 242->218 243->242
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1001319A
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • SelectObject.GDI32(?,00000000), ref: 100131E3
                                • IsWindowEnabled.USER32(?), ref: 100131FE
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 100132E2
                                • GetWindowTextA.USER32(?,?,00000400), ref: 10013319
                                • SendMessageA.USER32(?,000000F6,00000001,00000000), ref: 1001334D
                                • GetIconInfo.USER32(00000000,?), ref: 10013369
                                • GetObjectA.GDI32(?,00000018,?), ref: 1001337B
                                • GetTextExtentPointA.GDI32(?,?,?,?), ref: 100133A5
                                • DeleteObject.GDI32(?), ref: 100133E7
                                • DeleteObject.GDI32(?), ref: 100133EE
                                • SendMessageA.USER32(?,000000F6,00000000,00000000), ref: 10013420
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 10013436
                                • GetTextExtentPointA.GDI32(?,?,?,?), ref: 10013460
                                • DrawTextA.USER32(?,?,-00000001,?,00000000), ref: 1001352A
                                • GetPropA.USER32(?,SHE_G), ref: 100135C0
                                • IsWindowEnabled.USER32(?), ref: 100135D1
                                • SetTextColor.GDI32(?,?), ref: 10013607
                                • OffsetRect.USER32(?,?,?), ref: 1001362B
                                • SetBkMode.GDI32(?,00000001), ref: 10013638
                                • DrawTextA.USER32(?,?,?,?,00000000), ref: 10013663
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1001368D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Text$Rect$DeleteMessageSelectSendWindow$ClipDrawEnabledExtentPointProp$ClientColorCreateIconInflateInfoModeOffset
                                • String ID: SHE_G$s
                                • API String ID: 884910163-571881213
                                • Opcode ID: caf21a1c7cf1fe260952df342b86851fbddba4b749565e73e7d7b216ba7894aa
                                • Instruction ID: 0720dea72c005f8db2774b89525498d56df710bbe5d87d96d133ef9dad5b9a48
                                • Opcode Fuzzy Hash: caf21a1c7cf1fe260952df342b86851fbddba4b749565e73e7d7b216ba7894aa
                                • Instruction Fuzzy Hash: 7FF14AB42087419FE324CF64C885E6BB7E9FBC8710F108A1CF69987290DB74E949CB52

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 244 10005a40-10005a54 IsWindowEnabled 245 10005a56-10005a6e SendMessageA 244->245 246 10005a6f-10005aa9 GetWindowRect IsRectEmpty 244->246 247 10005bb2-10005bba 246->247 248 10005aaf-10005abc PtInRect 246->248 249 10005bc0-10005bd1 GetWindowLongA 247->249 250 10005d11-10005d16 247->250 251 10005ae5-10005af2 PtInRect 248->251 252 10005abe-10005ac7 248->252 255 10005cf1-10005d10 SendMessageA 249->255 256 10005bd7-10005c5b SetRect OffsetRect SetRect * 2 PtInRect 249->256 259 10005d18-10005d30 SendMessageA 250->259 253 10005b10-10005b1d PtInRect 251->253 254 10005af4-10005afd 251->254 257 10005b7d-10005b85 252->257 258 10005acd-10005ad0 252->258 262 10005b3b-10005b4e PtInRect 253->262 263 10005b1f-10005b28 253->263 254->257 260 10005aff-10005b02 254->260 264 10005c7d-10005c88 PtInRect 256->264 265 10005c5d-10005c78 LoadCursorA SetCursor 256->265 257->249 261 10005b87-10005b8f 257->261 258->257 266 10005ad6-10005ae0 258->266 260->257 268 10005b04-10005b0e 260->268 261->247 269 10005b91-10005bac SetTimer 261->269 271 10005b50-10005b53 262->271 272 10005b66-10005b68 262->272 263->257 270 10005b2a-10005b2d 263->270 273 10005ca7-10005cb2 PtInRect 264->273 274 10005c8a-10005ca5 LoadCursorA SetCursor 264->274 265->259 267 10005b74-10005b75 call 10004e30 266->267 281 10005b7a 267->281 268->267 269->247 270->257 275 10005b2f-10005b39 270->275 271->257 276 10005b55-10005b58 271->276 272->257 279 10005b6a 272->279 277 10005cd1-10005cf0 SendMessageA 273->277 278 10005cb4-10005ccf LoadCursorA SetCursor 273->278 274->259 275->267 276->257 282 10005b5a-10005b64 276->282 278->259 279->267 281->257 282->267
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10005A4C
                                • SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 10005A62
                                • GetWindowRect.USER32(?,?), ref: 10005A7B
                                • IsRectEmpty.USER32(?), ref: 10005AA1
                                • PtInRect.USER32(?), ref: 10005AB8
                                • SetTimer.USER32 ref: 10005BAC
                                • GetWindowLongA.USER32(?,000000F0), ref: 10005BC6
                                • SetRect.USER32(?,00000000,00000000,00000005,0000001D), ref: 10005BF3
                                • OffsetRect.USER32(?,?,?), ref: 10005C08
                                • SetRect.USER32(?,?,00000000,?,0000001D), ref: 10005C2A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window$EmptyEnabledLongMessageOffsetSendTimer
                                • String ID:
                                • API String ID: 70592305-0
                                • Opcode ID: 9b1bcf4309ba79a44affa8d35e3d6eb1101dc492926530dc94eed6df942145db
                                • Instruction ID: d42ccc5a3b2781513f2fd8ff1ff6268cf5ee92936f68469feebf928f78cc2080
                                • Opcode Fuzzy Hash: 9b1bcf4309ba79a44affa8d35e3d6eb1101dc492926530dc94eed6df942145db
                                • Instruction Fuzzy Hash: CA819C75204706AFF320DBA4CC89FAB77E8EB88B81F104909F656C6294E771F905CB25

                                Control-flow Graph

                                APIs
                                • GetWindowLongA.USER32(?,000000F0), ref: 1000C945
                                • GetWindowLongA.USER32(?,000000EC), ref: 1000C968
                                • IsWindowEnabled.USER32(?), ref: 1000C982
                                • SendMessageA.USER32(?,00000138,00000000,?), ref: 1000C9A3
                                • GetClientRect.USER32(?,?), ref: 1000C9B4
                                • GetWindowRect.USER32(?,?), ref: 1000C9C3
                                • ClientToScreen.USER32(?,?), ref: 1000C9D8
                                • ClientToScreen.USER32(?,?), ref: 1000C9E3
                                • OffsetRect.USER32(?,?,?), ref: 1000C9FE
                                • OffsetRect.USER32(?,?,?), ref: 1000CA13
                                • SelectObject.GDI32(00000000,00000000), ref: 1000CA17
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000CA39
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000CA51
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000CA5A
                                • SelectClipRgn.GDI32(00000000,00000000), ref: 1000CA62
                                • DeleteObject.GDI32(00000000), ref: 1000CA6F
                                • DeleteObject.GDI32(00000000), ref: 1000CA72
                                • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1000CA88
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 1000CACF
                                • IsWindowEnabled.USER32(?), ref: 1000CAD9
                                • GetFocus.USER32 ref: 1000CAE7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window$ClientObject$CreateDeleteEnabledLongOffsetScreenSelect$ClipCombineFocusInflateMessageSend
                                • String ID:
                                • API String ID: 1428229788-0
                                • Opcode ID: d4372ce6a2278cce0392c1b9f9947206522c49e50afc0a6178835e897f4a38ff
                                • Instruction ID: f3ce32309e44c4e53b58f03bab4cd10378bf4dbb7bac6551a4584a97cbcaf063
                                • Opcode Fuzzy Hash: d4372ce6a2278cce0392c1b9f9947206522c49e50afc0a6178835e897f4a38ff
                                • Instruction Fuzzy Hash: 26714DB8204305AFE304DF65CC84E2BB7E8EFC9754F108A1DF99993260D675E946CB62

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 408 696f83-696f9f call 69fb7d 411 696fb8-696fd4 call 69f5f5 408->411 412 696fa1-696fb3 CallNextHookEx 408->412 416 696fe8-696fef 411->416 417 696fd6-696fda 411->417 413 697175-697176 412->413 420 69703d-69703f 416->420 421 696ff1-696fff GetClassLongA 416->421 418 697149 417->418 419 696fe0-696fe2 417->419 422 69714c-697161 CallNextHookEx 418->422 419->416 419->418 423 6970ee-6970fc GetWindowLongA 420->423 424 697045-697048 call 696cf0 420->424 421->418 425 697005-697010 421->425 428 697170-697174 422->428 429 697163-69716c UnhookWindowsHookEx 422->429 423->418 431 6970fe-69710f GetPropA 423->431 432 69704d-697068 424->432 426 697029-697037 lstrcmpiA 425->426 427 697012-697026 GlobalGetAtomNameA 425->427 426->418 426->420 427->426 428->413 429->428 431->418 433 697111-697123 SetPropA GetPropA 431->433 439 6970cb-6970de call 696da2 SetWindowLongA 432->439 440 69706a-69706e 432->440 433->418 434 697125-697138 GlobalAddAtomA 433->434 436 69713a 434->436 437 69713f-697143 SetWindowLongA 434->437 436->437 437->418 445 6970e0-6970e3 439->445 446 6970e5-6970ec 439->446 440->439 442 697070-697078 440->442 442->439 444 69707a-69707e 442->444 444->439 447 697080-697095 call 696ae0 444->447 445->446 446->422 447->439 450 697097-6970bb call 696da2 GetWindowLongA 447->450 450->446 454 6970bd-6970c9 SetWindowLongA 450->454 454->445
                                APIs
                                  • Part of subcall function 0069FB7D: TlsGetValue.KERNEL32(00908F44,?,00000000,0069F604,0069EEF7,0069F620,0069A219,0069B4C1,?,00000000,?,00691BBF,00000000,00000000,00000000,00000000), ref: 0069FBBC
                                • CallNextHookEx.USER32(?,00000003,?,?), ref: 00696FAD
                                • GetClassLongA.USER32(?,000000E6), ref: 00696FF4
                                • GlobalGetAtomNameA.KERNEL32(?,?,00000005,?,?,?,Function_0029EEF7), ref: 00697020
                                • lstrcmpiA.KERNEL32(?,ime), ref: 0069702F
                                • GetWindowLongA.USER32(?,000000FC), ref: 006970A2
                                • SetWindowLongA.USER32(?,000000FC,00000000), ref: 006970C3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Long$Window$AtomCallClassGlobalHookNameNextValuelstrcmpi
                                • String ID: AfxOldWndProc423$ime
                                • API String ID: 3731301195-104836986
                                • Opcode ID: 8b5d24c515c9403b2287001c3f195bd9e8ab5ba2e81872aba901ad8c0f484400
                                • Instruction ID: e62b3f7afbff1f17f9d5a08954ab68a3074954f61a3640821bb7b8e89461b46a
                                • Opcode Fuzzy Hash: 8b5d24c515c9403b2287001c3f195bd9e8ab5ba2e81872aba901ad8c0f484400
                                • Instruction Fuzzy Hash: A951CE71518225AFCF21AF65DC08BAA7BBEFF05361F145618F815A7AA0D731D900CFA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 455 10013810-1001390c GetClientRect call 1000fbf0 call 10012060 SelectObject call 10009a50 InflateRect * 2 466 10013984-10013991 455->466 467 1001390e-1001391a IsWindowEnabled 455->467 468 100139b1-100139cb 466->468 469 10013993-100139af 466->469 470 1001391c-10013924 467->470 471 1001395f-1001397f 467->471 473 100139cf-100139db 468->473 469->473 474 10013946-1001395a 470->474 475 10013926-10013941 470->475 472 10013a51-10013a5f call 1000b6e0 471->472 484 10013a61-10013a65 472->484 485 10013a7b-10013a7d 472->485 477 100139f3-100139ff 473->477 478 100139dd-100139f1 473->478 476 10013a4b-10013a50 474->476 475->472 476->472 481 10013a11-10013a36 477->481 482 10013a01-10013a0f 477->482 480 10013a3a-10013a47 478->480 480->476 481->480 482->480 486 10013a67-10013a76 484->486 487 10013a87-10013ab6 GetWindowTextA 485->487 488 10013a7f-10013a85 485->488 489 10013c32-10013c88 call 1000fc70 486->489 487->489 490 10013abc-10013ad0 487->490 488->486 492 10013ad2-10013ad7 490->492 493 10013ad9-10013adf 490->493 494 10013aee-10013af1 492->494 495 10013ae1-10013ae7 493->495 496 10013ae9 493->496 498 10013bb0-10013bb9 494->498 499 10013af7-10013b4a DrawTextA 494->499 495->494 495->496 496->494 501 10013bcb-10013bdc GetPropA 498->501 502 10013bbb-10013bc1 498->502 503 10013b62-10013b68 499->503 504 10013b4c-10013b60 499->504 508 10013bf4-10013c2c SetTextColor SetBkMode DrawTextA 501->508 509 10013bde-10013bf1 501->509 506 10013bc3-10013bc6 502->506 507 10013bc8 502->507 510 10013b80-10013bae 503->510 511 10013b6a-10013b7e 503->511 504->501 506->501 507->501 508->489 509->508 510->501 511->501
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1001383A
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • SelectObject.GDI32(?,00000000), ref: 10013889
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 100138F0
                                • InflateRect.USER32(00000000,000000FF,000000FF), ref: 100138FB
                                • IsWindowEnabled.USER32(?), ref: 10013912
                                • GetWindowTextA.USER32(?,?,00000400), ref: 10013AA2
                                • DrawTextA.USER32(?,?,?,?,00000001), ref: 10013B3E
                                • GetPropA.USER32(?,SHE_G), ref: 10013BD4
                                • SetTextColor.GDI32(?,00000000), ref: 10013BFA
                                • SetBkMode.GDI32(?,00000001), ref: 10013C07
                                • DrawTextA.USER32(?,?,?,?,00000001), ref: 10013C2C
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 10013C56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: RectText$ObjectSelect$ClipDrawInflatePropWindow$ClientColorCreateDeleteEnabledMessageModeSend
                                • String ID: SHE_G$s
                                • API String ID: 1435283344-571881213
                                • Opcode ID: bf8b04a64fc7e9720845d1a8b633114ab653b3764a86c28c23747f38c52eb1d7
                                • Instruction ID: 6eeb226ef1bb0de1b614e7657a0c8b189afcc3c0ce88ba382625342e3441b8cf
                                • Opcode Fuzzy Hash: bf8b04a64fc7e9720845d1a8b633114ab653b3764a86c28c23747f38c52eb1d7
                                • Instruction Fuzzy Hash: 5DE137B52083019FD354CF68C884A6AB7E5FFC8714F108A1DFAA987391D774E945CB92

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 513 1001a4f0-1001a505 514 1001a50b-1001a50d 513->514 515 1001a65d-1001a679 CallNextHookEx 513->515 514->515 516 1001a513-1001a518 514->516 516->515 517 1001a51e-1001a524 516->517 518 1001a574-1001a577 517->518 519 1001a526-1001a52d 517->519 520 1001a5c7-1001a5ca 518->520 521 1001a579-1001a57e 518->521 519->515 522 1001a533-1001a536 519->522 524 1001a5d7-1001a5ea GetPropA 520->524 525 1001a5cc-1001a5d1 520->525 521->515 523 1001a584-1001a589 521->523 522->515 526 1001a53c-1001a549 call 10009a50 522->526 523->515 527 1001a58f-1001a59c call 10009a50 523->527 524->515 529 1001a5ec-1001a5f9 GetPropA 524->529 525->515 525->524 526->515 536 1001a54f-1001a56f SetPropA call 100099f0 526->536 527->515 540 1001a5a2-1001a5c2 SetPropA call 100099f0 527->540 529->515 532 1001a5fb-1001a608 GetPropA 529->532 533 1001a627-1001a647 GetClassNameA call 1001a030 532->533 534 1001a60a-1001a625 GetPropA call 10019730 532->534 543 1001a64c-1001a657 SetPropA 533->543 534->543 536->515 540->515 543->515
                                APIs
                                • SetPropA.USER32(?,SHE_B,00000000), ref: 1001A559
                                • SetPropA.USER32(?,SHE_B,00000000), ref: 1001A5AC
                                • CallNextHookEx.USER32(?,?,?,?), ref: 1001A66D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop$CallHookNext
                                • String ID: SHE$SHE_A$SHE_B$SHE_C
                                • API String ID: 3868478265-22028169
                                • Opcode ID: 3ad3b6f22818cb3d5e03a360cef7d00c705002ca51ab2797111fcf47ea3a9929
                                • Instruction ID: 7811e094c1e109cc8e8b8a1a0b8848a8eb1566d8d7a83a7f68ba57272ffb72e5
                                • Opcode Fuzzy Hash: 3ad3b6f22818cb3d5e03a360cef7d00c705002ca51ab2797111fcf47ea3a9929
                                • Instruction Fuzzy Hash: 0D415479600611EFD614DB94CC80D2773E9EF966A07158A18F66ACB690D734FC85CB20

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 749 10024520-1002452b 750 10024643-10024644 749->750 751 10024531-10024642 CreateWindowExA * 4 SetPropA * 4 749->751 751->750
                                APIs
                                • CreateWindowExA.USER32(00080000,ComboLBox ,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10024562
                                • CreateWindowExA.USER32(00080000,ComboLBox ,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10024594
                                • CreateWindowExA.USER32(00080000,ComboLBox ,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 100245C6
                                • CreateWindowExA.USER32(00080000,ComboLBox ,00000000,80000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000), ref: 100245F8
                                • SetPropA.USER32(?,SHE_F,?), ref: 10024613
                                • SetPropA.USER32(?,SHE_F,?), ref: 10024622
                                • SetPropA.USER32(?,SHE_F,?), ref: 10024631
                                • SetPropA.USER32(?,SHE_F,?), ref: 10024640
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreatePropWindow
                                • String ID: ComboLBox $SHE_F
                                • API String ID: 661344865-4007208376
                                • Opcode ID: 1089ebc232d11df68c40f06de5aeeb89f545c28512acefa0cdbd24b27eb5c3d6
                                • Instruction ID: 9f628f48033890d7f24c30de2fa77ca5103cf21e47ce77eaf880fe3b7e00f918
                                • Opcode Fuzzy Hash: 1089ebc232d11df68c40f06de5aeeb89f545c28512acefa0cdbd24b27eb5c3d6
                                • Instruction Fuzzy Hash: F931B9753C0704BAE270DBA5DC86F93B7A8EF98B11F314519F749AB2D0C6A0B8418B58

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 752 60a2e0-60a341 GetProcessHeap 753 60a343-60a34b OleInitialize 752->753 754 60a355-60a37e GetModuleFileNameA call 684257 752->754 753->754 757 60a380-60a399 call 695340 754->757 758 60a39b-60a3ae call 69518e 754->758 763 60a3af-60a45c call 695340 SetCurrentDirectoryA call 5f3fd0 * 3 LoadCursorA GetStockObject call 5e9620 call 697207 757->763 758->763 775 60a461-60a474 GetCurrentThreadId 763->775 776 60a495-60a49d 775->776 777 60a476-60a48f 775->777 778 60a543-60a54d 776->778 779 60a4a3-60a4ee call 5c48b0 * 4 776->779 777->776 780 60a5af-60a5b5 778->780 781 60a54f-60a553 778->781 808 60a4f0-60a4fb 779->808 809 60a512-60a516 779->809 785 60a814-60a824 780->785 786 60a5bb-60a67d call 5c4140 call 695811 call 69d1e9 call 69d271 call 69c4d3 call 5dbee0 call 69c637 call 69c5af call 69d2ae call 69584f 780->786 783 60a555-60a55f 781->783 784 60a57d-60a5aa call 5c48b0 * 2 781->784 789 60a561-60a566 783->789 790 60a578-60a57b 783->790 784->780 830 60a683-60a686 786->830 831 60a76a-60a80f call 5db4a0 call 5c4340 call 5dbe20 call 5c4340 * 2 786->831 789->790 794 60a568-60a572 789->794 790->783 790->784 794->790 811 60a50d-60a510 808->811 812 60a4fd-60a505 808->812 809->778 813 60a518-60a523 809->813 811->808 811->809 812->811 815 60a507-60a50a 812->815 816 60a525-60a536 813->816 817 60a53e-60a541 813->817 815->811 816->817 819 60a538-60a53b 816->819 817->778 817->813 819->817 833 60a689-60a695 830->833 831->785 835 60a754-60a764 833->835 836 60a69b 833->836 835->831 835->833 838 60a69e-60a6b5 call 5dacf0 call 5db520 836->838 848 60a6b7-60a6dc call 636120 * 3 838->848 849 60a6ef-60a72a call 636120 * 3 838->849 864 60a6e7-60a6ed 848->864 865 60a6de-60a6e5 848->865 866 60a748-60a74e 849->866 867 60a72c-60a731 849->867 864->866 865->866 866->835 866->838 868 60a733-60a73a 867->868 869 60a73c 867->869 870 60a742-60a746 868->870 869->870 870->866 870->867
                                APIs
                                • GetProcessHeap.KERNEL32 ref: 0060A309
                                • OleInitialize.OLE32(00000000), ref: 0060A345
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0060A363
                                • SetCurrentDirectoryA.KERNEL32(027256C8,?), ref: 0060A3BD
                                • LoadCursorA.USER32(00000000,00007F00), ref: 0060A418
                                • GetStockObject.GDI32(00000005), ref: 0060A439
                                • GetCurrentThreadId.KERNEL32 ref: 0060A461
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Current$CursorDirectoryFileHeapInitializeLoadModuleNameObjectProcessStockThread
                                • String ID: $j$_EL_HideOwner
                                • API String ID: 3783217854-3981174878
                                • Opcode ID: 29583d984f0f1c8d4b8cf058cdd5e2c44807888f13fa5609fe9fc5642538a643
                                • Instruction ID: 3e4eaca1cd0e317e5337d0f1a186104cbe070bbf7a941e73e2e02cf2405c834b
                                • Opcode Fuzzy Hash: 29583d984f0f1c8d4b8cf058cdd5e2c44807888f13fa5609fe9fc5642538a643
                                • Instruction Fuzzy Hash: 57E1CF70A402059FCB58EF94DC95FEE77BABF85300F14416CE905A7282DB74AA41CF65

                                Control-flow Graph

                                APIs
                                • __EH_prolog.LIBCMT ref: 00696DAD
                                • GetPropA.USER32(?,AfxOldWndProc423), ref: 00696DC5
                                • CallWindowProcA.USER32(?,?,00000110,?,00000000), ref: 00696E23
                                  • Part of subcall function 00696990: GetWindowRect.USER32(?,?), ref: 006969B5
                                  • Part of subcall function 00696990: GetWindow.USER32(?,00000004), ref: 006969D2
                                • SetWindowLongA.USER32(?,000000FC,?), ref: 00696E53
                                • RemovePropA.USER32(?,AfxOldWndProc423), ref: 00696E5B
                                • GlobalFindAtomA.KERNEL32(AfxOldWndProc423), ref: 00696E62
                                • GlobalDeleteAtom.KERNEL32(00000000), ref: 00696E69
                                  • Part of subcall function 0069696D: GetWindowRect.USER32(?,?), ref: 00696979
                                • CallWindowProcA.USER32(?,?,?,?,00000000), ref: 00696EBD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
                                • String ID: AfxOldWndProc423
                                • API String ID: 2397448395-1060338832
                                • Opcode ID: 965783a533c0af0edb4d62252c24bf4971197fb4c0c42de68888b1150666e4e3
                                • Instruction ID: 68351df452b1a90b6df5bfa96f8933d637632f62b7aed728ecc0bc214a11d7b7
                                • Opcode Fuzzy Hash: 965783a533c0af0edb4d62252c24bf4971197fb4c0c42de68888b1150666e4e3
                                • Instruction Fuzzy Hash: D4315A3280020AAFCF01AFA5DD49EFF7ABEEF46310F000519F602A2560D7359A11DBA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 898 1001c450-1001c469 GetPropA 899 1001c485-1001c48f GetPropA 898->899 900 1001c46b-1001c47f RemovePropA SendMessageA 898->900 901 1001c491-1001c494 899->901 902 1001c4d4-1001c4d7 899->902 900->899 903 1001c496-1001c4a8 901->903 904 1001c4ae-1001c4b7 IsWindowVisible 901->904 903->904 904->902 905 1001c4b9-1001c4ce InvalidateRect SetWindowPos 904->905 905->902
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001C463
                                • RemovePropA.USER32(?,SHE_A), ref: 1001C471
                                • SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1001C47F
                                • GetPropA.USER32(?,SHE), ref: 1001C48B
                                • IsWindowVisible.USER32(?), ref: 1001C4AF
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?,1001C40B,?), ref: 1001C4BD
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,?,1001C40B,?), ref: 1001C4CE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop$Window$InvalidateMessageRectRemoveSendVisible
                                • String ID: SHE$SHE_A
                                • API String ID: 2510188223-3055163332
                                • Opcode ID: 51a537452bd44370889b0a1f1f194821304f9a483811099fd7e9da286f0db7f1
                                • Instruction ID: 11fdaa9114d1614bf2f695c029d4fea50ea2cb84254ba2801cf49c8279bf9916
                                • Opcode Fuzzy Hash: 51a537452bd44370889b0a1f1f194821304f9a483811099fd7e9da286f0db7f1
                                • Instruction Fuzzy Hash: B0016D75202A29EFE780AF954CC8DFB76ACEF45285B1280B9F20596011C7708A428BA5
                                APIs
                                • EnterCriticalSection.KERNEL32(00908F60,00908F34,00000000,?,00908F44,00908F44,0069FBB1,?,00000000,0069F604,0069EEF7,0069F620,0069A219,0069B4C1,?,00000000), ref: 0069F825
                                • GlobalAlloc.KERNEL32(00002002,00000000,?,?,00908F44,00908F44,0069FBB1,?,00000000,0069F604,0069EEF7,0069F620,0069A219,0069B4C1,?,00000000), ref: 0069F87A
                                • GlobalHandle.KERNEL32(00C02DC0), ref: 0069F883
                                • GlobalUnlock.KERNEL32(00000000), ref: 0069F88C
                                • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 0069F89E
                                • GlobalHandle.KERNEL32(00C02DC0), ref: 0069F8B5
                                • GlobalLock.KERNEL32(00000000), ref: 0069F8BC
                                • LeaveCriticalSection.KERNEL32(006821F4,?,?,00908F44,00908F44,0069FBB1,?,00000000,0069F604,0069EEF7,0069F620,0069A219,0069B4C1,?,00000000), ref: 0069F8C2
                                • GlobalLock.KERNEL32(00000000), ref: 0069F8D1
                                • LeaveCriticalSection.KERNEL32(?), ref: 0069F91A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                • String ID:
                                • API String ID: 2667261700-0
                                • Opcode ID: 14a26840fa2a78f0605485d7b02b3a4015b96797ea69572b6435855661975171
                                • Instruction ID: 3d653e622268a67838405aa4448a793a036817c86004630de7619ddcfc1a366f
                                • Opcode Fuzzy Hash: 14a26840fa2a78f0605485d7b02b3a4015b96797ea69572b6435855661975171
                                • Instruction Fuzzy Hash: 98315E716007059FDB64AF28DD89A6AB7FEFB45301B010A2DF492C7A61E771F8048F20
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 1000C1D7
                                • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 1000C1F5
                                • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C204
                                • IsWindowVisible.USER32(00000000), ref: 1000C211
                                • GetWindowRect.USER32(00000000,?), ref: 1000C22D
                                • OffsetRect.USER32(?,?,?), ref: 1000C242
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C25C
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000C269
                                • DeleteObject.GDI32(00000000), ref: 1000C270
                                • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C280
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: RectWindow$CreateFind$CombineDeleteObjectOffsetVisible
                                • String ID:
                                • API String ID: 1313402854-0
                                • Opcode ID: 8629bedc85b525c95f566e4f9ec39ac268af53675b713f40d67e7f6029a4d90e
                                • Instruction ID: 0129f1f143ae883f5581523c8020f595d90fc1c3a02a3f94cc4d99a36711fcdf
                                • Opcode Fuzzy Hash: 8629bedc85b525c95f566e4f9ec39ac268af53675b713f40d67e7f6029a4d90e
                                • Instruction Fuzzy Hash: AD210C75205325AFE2109B65CC85F3BB7ECEBC9B55F104619FA45A3240DA20ED068B66
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 10022268
                                • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00002719), ref: 1002229B
                                • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00002719), ref: 100222D3
                                • SetWindowPos.USER32(?,?,?,?,00000000,00000000,00002719), ref: 10022313
                                • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,0000271B), ref: 100223B8
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?,00000000,?,76C15440,1002584E,00000000), ref: 10024747
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?), ref: 10024751
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?), ref: 1002475B
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?), ref: 10024765
                                • CallWindowProcA.USER32(?,?,00000047,?,?), ref: 100223DC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Show$CallProcRect
                                • String ID:
                                • API String ID: 3118190714-0
                                • Opcode ID: 0dca7d29e93af85ade0fce1f98af7d168de262e2d7b920e1a23795d0ee674c28
                                • Instruction ID: 8dc1deb737b558b6c714bf112c7838984d22b05039a9ca3c04896061e2edaa8e
                                • Opcode Fuzzy Hash: 0dca7d29e93af85ade0fce1f98af7d168de262e2d7b920e1a23795d0ee674c28
                                • Instruction Fuzzy Hash: 3651FF75344701AFE224DA68DC96FABB3E9EB88B10F10890DF65A973D5CA74BC018B54
                                APIs
                                • IsWindowVisible.USER32(?), ref: 10022A2C
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 10022A87
                                • GetMenu.USER32(?), ref: 10022AB2
                                • SetMenu.USER32(?,00000000), ref: 10022AC4
                                • GetWindowRect.USER32(?,00400000), ref: 10022AEB
                                • SendMessageA.USER32(?,00000083,00000000,?), ref: 10022B01
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 10022B1E
                                • SetMenu.USER32(?,00000000), ref: 10022B43
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Menu$CallProc$MessageRectSendVisible
                                • String ID:
                                • API String ID: 3332730756-0
                                • Opcode ID: be17ffcd072d127f7334e16dffc81dd63c0512f848037c73dbf9b586abf24c7e
                                • Instruction ID: 9276f38f3cf173ca9a812d88aef6df53489b9eb25c2b5bf1bf9ebad47c79e053
                                • Opcode Fuzzy Hash: be17ffcd072d127f7334e16dffc81dd63c0512f848037c73dbf9b586abf24c7e
                                • Instruction Fuzzy Hash: 5F416A79204701AFD260DBA9DC84E67B3E9EB88754F208A1DF55AC3661C634E942CB60
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Empty$Window$MessageSendVisible
                                • String ID:
                                • API String ID: 1963373104-0
                                • Opcode ID: e9bd8bf3015e0fc931efd3356353d720a6aee9b169a9c962a95d430c27da7b1e
                                • Instruction ID: 15d01376b549b43e06bef1ecdf41231e929ad262f4cddba4413b2d284a982563
                                • Opcode Fuzzy Hash: e9bd8bf3015e0fc931efd3356353d720a6aee9b169a9c962a95d430c27da7b1e
                                • Instruction Fuzzy Hash: A131AD38300B02ABD654DA75DC95FABB3E9EF94740F41890CFA5AC3250DB70E951CB90
                                APIs
                                • 74001530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
                                • SelectObject.GDI32(00000000,00000000), ref: 1000B55F
                                • 74001530.MSIMG32(?,?,00BD2B74,?,?,00000000,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?), ref: 1000B5BA
                                • DeleteObject.GDI32(?), ref: 1000B5C5
                                • DeleteDC.GDI32(00000000), ref: 1000B5CC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: 74001530DeleteObject$Select
                                • String ID:
                                • API String ID: 905560827-0
                                • Opcode ID: cea02a7140ad39d7cb010459c9ee0d1b607245b3b0f0fafe053c611a6cff785f
                                • Instruction ID: a2bec2eff1570f1e033dcbeedc9227712d92de05b5e2e1092a7d92024c81a4dd
                                • Opcode Fuzzy Hash: cea02a7140ad39d7cb010459c9ee0d1b607245b3b0f0fafe053c611a6cff785f
                                • Instruction Fuzzy Hash: 083114B6206611BFE254DF59CC88F6BB7EDEBC8B91F10495CF64987250D630EC028B61
                                APIs
                                • SendMessageA.USER32 ref: 1001E552
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 1001E599
                                • 6FA9CFD0.COMCTL32(?,?,?,00000000,?,00000001), ref: 1001E727
                                  • Part of subcall function 1000E930: SetRectEmpty.USER32(?), ref: 1000E942
                                  • Part of subcall function 1000E930: SetRectEmpty.USER32(?), ref: 1000E949
                                • 6FA9CFD0.COMCTL32(?,?,?,?,?,00000001), ref: 1001E685
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Empty$InflateMessageSend
                                • String ID:
                                • API String ID: 2147231653-0
                                • Opcode ID: c1d657de1969eec40a7d2c4ceaca19b3ee4d01ccf90aa8a5cb8032dc9250f240
                                • Instruction ID: 714f37e124b3561914c789874ae4d57327775486736af5f1980e57804d13f8a5
                                • Opcode Fuzzy Hash: c1d657de1969eec40a7d2c4ceaca19b3ee4d01ccf90aa8a5cb8032dc9250f240
                                • Instruction Fuzzy Hash: 8E81D0B56183409FD354CF58C880A6BFBE9FBC9700F108A2DFA9887351E771E9458B96
                                APIs
                                • SendMessageA.USER32(?,0000007F,00000002,00000000), ref: 10025C83
                                • SendMessageA.USER32(?,0000007F,00000000,00000000), ref: 10025C8E
                                • GetClassLongA.USER32(?,000000F2), ref: 10025C97
                                • SendMessageA.USER32(?,0000007F,00000001,00000000), ref: 10025CA7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$ClassLong
                                • String ID:
                                • API String ID: 1264571673-0
                                • Opcode ID: 370d63bef3b9863a2f2e968b8f2886904922ea484c8d1e949867ab0d5a59f7f0
                                • Instruction ID: 947a8f3f8a0cea30fb6e839a99a16b54cd066c6a9c51171dd670646b1ab2be3e
                                • Opcode Fuzzy Hash: 370d63bef3b9863a2f2e968b8f2886904922ea484c8d1e949867ab0d5a59f7f0
                                • Instruction Fuzzy Hash: AEE0DF6A3453277DF11066269C02FAB328C8F91B91F224120FB04F50C4E2A6AD0306B8
                                APIs
                                • ShowWindow.USER32(?,?,00000000,?,76C15440,1002584E,00000000), ref: 10024747
                                • ShowWindow.USER32(?,?), ref: 10024751
                                • ShowWindow.USER32(?,?), ref: 1002475B
                                • ShowWindow.USER32(?,?), ref: 10024765
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: 3295a3fcf0ae12c1fcbb8f7e5f53fbdeca41f72dae6878fcabe25103e68869c8
                                • Instruction ID: fbebdeaf8877d8e39abbbfefd4f084f7c7d7f891781dffc730fc7a01b7582861
                                • Opcode Fuzzy Hash: 3295a3fcf0ae12c1fcbb8f7e5f53fbdeca41f72dae6878fcabe25103e68869c8
                                • Instruction Fuzzy Hash: 28E092B6201750ABD224DAAACCC8D97F7ECFBCE711B50491EB259832008A75E801C774
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 0069A23C
                                • SetWindowsHookExA.USER32(000000FF,VnP,00000000,00000000), ref: 0069A24C
                                  • Part of subcall function 0069FC12: __EH_prolog.LIBCMT ref: 0069FC17
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CurrentH_prologHookThreadWindows
                                • String ID: VnP
                                • API String ID: 2183259885-3641916949
                                • Opcode ID: 7953e8031589f70d2764d3e9a64a37643e37deefb840e4b5d9e347ad8de269c7
                                • Instruction ID: a8bbeb9541754cab277bd53c70a096f9f9d346213d99f6b13e0c95a0c4717ae6
                                • Opcode Fuzzy Hash: 7953e8031589f70d2764d3e9a64a37643e37deefb840e4b5d9e347ad8de269c7
                                • Instruction Fuzzy Hash: E8F0A7315003105EDFA03FB0A80DB5936EB9B05310F070678F551DBDE1CA25AE408796
                                APIs
                                • GetPropA.USER32(?,SHE_I), ref: 1001206C
                                • SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessagePropSend
                                • String ID: SHE_I
                                • API String ID: 25370605-2739127632
                                • Opcode ID: 7d5e3bc90b47571d82ce137a822031f71c38e63c62c9b70d0aa0c542d69259e0
                                • Instruction ID: b8d12084a5fb27a2b02e8c7b5d46552afd1830b42c17ef8beebdc7801db986c6
                                • Opcode Fuzzy Hash: 7d5e3bc90b47571d82ce137a822031f71c38e63c62c9b70d0aa0c542d69259e0
                                • Instruction Fuzzy Hash: E4E06DB93003139BE360CB98CC84E5273ECEF88694B114518F509CB211D7B0EC91CB50
                                APIs
                                • CallWindowProcA.USER32(?,?,00000001,?,?), ref: 10015429
                                • CallWindowProcA.USER32(?,?,00000001,?,?), ref: 100154AD
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,0000263F), ref: 100154C6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$CallProc
                                • String ID:
                                • API String ID: 883168683-0
                                • Opcode ID: 049282dc8febc6ffcff643e693e9be518f14e6765984f4641e482d5a9bc57cbd
                                • Instruction ID: 2f0a6d1fae90f1da847d9558e590aaa30e7de1fb8e63c55613dd495823e97c50
                                • Opcode Fuzzy Hash: 049282dc8febc6ffcff643e693e9be518f14e6765984f4641e482d5a9bc57cbd
                                • Instruction Fuzzy Hash: 4621E8B4204701EFE360CF24C884F97B7E9EB88314F10891DF5AA8B690D771E885CB60
                                APIs
                                • GetCurrentProcess.KERNEL32(?,?,10026677,00000000,00000020), ref: 10026463
                                • FlushInstructionCache.KERNEL32(10026677,00000000,10026677,?,10026677,00000000,00000020), ref: 1002648E
                                • VirtualProtect.KERNEL32(00000000,10026677,00000040,00000014,?,10026677,00000000,00000020), ref: 100264AB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                • String ID:
                                • API String ID: 3733156554-0
                                • Opcode ID: 6ab28333a214872ef38e7cec3ea03a05ced2cd15625bfb15ed58538e5cadbd30
                                • Instruction ID: 63f23e8b59d19312b92c29cae95ac7a559587f2e0b5583b49ef3a248e102aaa7
                                • Opcode Fuzzy Hash: 6ab28333a214872ef38e7cec3ea03a05ced2cd15625bfb15ed58538e5cadbd30
                                • Instruction Fuzzy Hash: 0E11A278A00208EFDB44DF98D984A9AB7F5FB48304F20C199F9099B350C735EE41DB90
                                APIs
                                • GetWindowLongA.USER32(?,?), ref: 006968F3
                                • SetWindowLongA.USER32(?,?,?), ref: 00696912
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0069692C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Long
                                • String ID:
                                • API String ID: 847901565-0
                                • Opcode ID: eb16f128ed70f18cf87e9200b8257269430a047657a6106005709ea66cf25e99
                                • Instruction ID: 8d72f42764536bdc00601f433bdf8c74f1abe473a9dcb46b6d04dcbff35f4343
                                • Opcode Fuzzy Hash: eb16f128ed70f18cf87e9200b8257269430a047657a6106005709ea66cf25e99
                                • Instruction Fuzzy Hash: 90F0303515010ABFDF089F50DC5ACAE3F6AEB19351B005429F90AC5160D732E861EE60
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: _inittermfreemalloc
                                • String ID:
                                • API String ID: 1678931842-0
                                • Opcode ID: 28efe3b135363df1d26e65f438198e95a9e2b0e57acad8b9d4fda251abc1b172
                                • Instruction ID: c3025327f4686e2d82251761483d94adc5640adac6d06395e623d3ba54a4f38f
                                • Opcode Fuzzy Hash: 28efe3b135363df1d26e65f438198e95a9e2b0e57acad8b9d4fda251abc1b172
                                • Instruction Fuzzy Hash: 07115E316452A1CFF784CBA4EEC4B1A37A4FB09391B650479FC05CB2A5D721AC42CB00
                                APIs
                                • __EH_prolog.LIBCMT ref: 0069AF30
                                  • Part of subcall function 0069AC93: __EH_prolog.LIBCMT ref: 0069AC98
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: H_prolog
                                • String ID: V"'
                                • API String ID: 3519838083-1270798979
                                • Opcode ID: 7c6d6b7227b7a7d9f92a285add359ba065695b78e6d83d28da7e62b1aca38c12
                                • Instruction ID: 5bc4cf665504d5215e2d19bcf93d4d761aff09db64cafc03b33906f978bab8d4
                                • Opcode Fuzzy Hash: 7c6d6b7227b7a7d9f92a285add359ba065695b78e6d83d28da7e62b1aca38c12
                                • Instruction Fuzzy Hash: 8211D3B1600701DFCF24AF68C985AAAB7FEBF91354B10456DF04687A41EB70E801CB91
                                APIs
                                • SetPropA.USER32(?,SHE,00000000), ref: 10012151
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop
                                • String ID: SHE
                                • API String ID: 257714900-2947365353
                                • Opcode ID: a6d25bf58fb53c56b6b5107b1a26f9500140b162eb96946241964c681cb2208e
                                • Instruction ID: 35157bf594c235461d53df282a2f192a396ed101a5a2d3219a77b9f403ebd6a7
                                • Opcode Fuzzy Hash: a6d25bf58fb53c56b6b5107b1a26f9500140b162eb96946241964c681cb2208e
                                • Instruction Fuzzy Hash: 91E01A79504720EFC760DF69C888C47FBE8EF582203108B1EB499C3252D630E880CB90
                                APIs
                                • CallWindowProcA.USER32(?,?,00000000,?,?), ref: 10015010
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 10015136
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: 3a34cf9c1cf895b50e1ffedf62062b269e6f1887e1c20b20102255bf11944071
                                • Instruction ID: 3a9bc6d7e016e4f588f7fcbb5cad357005f6a59b672cc3281e17a6244433939f
                                • Opcode Fuzzy Hash: 3a34cf9c1cf895b50e1ffedf62062b269e6f1887e1c20b20102255bf11944071
                                • Instruction Fuzzy Hash: 815151BA208610EFD249DB54D851E7FB3AAEBD8711F14C90DF2568F245CA31EC8287A5
                                APIs
                                  • Part of subcall function 00695CBB: __EH_prolog.LIBCMT ref: 00695CC0
                                  • Part of subcall function 00695CBB: GetFullPathNameA.KERNEL32(?,00000104,?,?,?,?), ref: 00695CDE
                                  • Part of subcall function 00695CBB: lstrcpynA.KERNEL32(?,?,00000104), ref: 00695CED
                                • CreateFileA.KERNEL32(00000000,80000000,00000000,0000000C,00000003,00000080,00000000,?,?,?,?), ref: 00695A6A
                                • GetLastError.KERNEL32 ref: 00695A7C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreateErrorFileFullH_prologLastNamePathlstrcpyn
                                • String ID:
                                • API String ID: 1034715445-0
                                • Opcode ID: ba801cb3a1b3cef24f2dc5ccfc612d830dfd16565ae23cf5b05676967b1ed21a
                                • Instruction ID: 4a8178564a24b26fc69db01f72aef00f517f741132bcc6815bb8f80f1835894b
                                • Opcode Fuzzy Hash: ba801cb3a1b3cef24f2dc5ccfc612d830dfd16565ae23cf5b05676967b1ed21a
                                • Instruction Fuzzy Hash: 16313D32A10E05AFEF228F55CC86BEA739FAB84324F10861DF517CBAD0C6749D458744
                                APIs
                                • FlushInstructionCache.KERNEL32(?,00000000,00000000), ref: 100264FF
                                • VirtualProtect.KERNEL32(00000000,00000000,00000000,00000000), ref: 10026524
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CacheFlushInstructionProtectVirtual
                                • String ID:
                                • API String ID: 403598440-0
                                • Opcode ID: c3da033d4900e79327e44b0a828f40d223d41c1a4726ae3b7a942c81a8011169
                                • Instruction ID: 4cf98e0dcf6dfc27f34e277785f8542e4947d89007de13e16ffdbbdb6af82732
                                • Opcode Fuzzy Hash: c3da033d4900e79327e44b0a828f40d223d41c1a4726ae3b7a942c81a8011169
                                • Instruction Fuzzy Hash: 5E01D778A00208EFD740CF94D894A9DFBB9FB48314F50C298E80997355D731EE86CB50
                                APIs
                                • IsWindowVisible.USER32(?), ref: 100155D7
                                • SendMessageA.USER32(?,00007401,?,?), ref: 10015622
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSendVisibleWindow
                                • String ID:
                                • API String ID: 3984873885-0
                                • Opcode ID: e425412bac2dd5609632b791c03201e7e4bc2a645a05717b380cfd499959cf61
                                • Instruction ID: 0f9f9009dd7f2be491e8c3b5c0e3d0049e76c27d9775cccff0fff9ef78c6cd96
                                • Opcode Fuzzy Hash: e425412bac2dd5609632b791c03201e7e4bc2a645a05717b380cfd499959cf61
                                • Instruction Fuzzy Hash: 04F06239314611ABE214DB65DC45E5BF7ADEBD8710B00890DF545CB250CA71FC42C7A0
                                APIs
                                • SetErrorMode.KERNEL32(00000000,00000000,0069B4E0,00000000,00000000,00000000,00000000,?,00000000,?,00691BBF,00000000,00000000,00000000,00000000,006821F4), ref: 006A04E8
                                • SetErrorMode.KERNEL32(00000000,?,00000000,?,00691BBF,00000000,00000000,00000000,00000000,006821F4,00000000), ref: 006A04EF
                                  • Part of subcall function 006A0542: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 006A0573
                                  • Part of subcall function 006A0542: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 006A0614
                                  • Part of subcall function 006A0542: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 006A0641
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
                                • String ID:
                                • API String ID: 3389432936-0
                                • Opcode ID: 4c325d04a5f0d6e4267e33b216cf9a87f0f65cdbc345125136d542c27478d317
                                • Instruction ID: bac4e00a4e70e1717ff80ceb1c31de0e78ddff4d0a823e1d6ca1d2927017d611
                                • Opcode Fuzzy Hash: 4c325d04a5f0d6e4267e33b216cf9a87f0f65cdbc345125136d542c27478d317
                                • Instruction Fuzzy Hash: 99F090B49143118FDB94FF24D545B497BEAAF49710F06849EF4488B3A2CB70D840CF9A
                                APIs
                                • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000001,?,005BDA3F,-00000010,?,?,00001011,00000000), ref: 00695B01
                                • GetLastError.KERNEL32(?,?,005BDA3F,-00000010,?,?,00001011,00000000), ref: 00695B0E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ErrorFileLastWrite
                                • String ID:
                                • API String ID: 442123175-0
                                • Opcode ID: b402cc0d89dcfbb95b312ef96cc12808fc3cbcc453e2601e4e810a9defec9065
                                • Instruction ID: 925454e8fcc1a4d38e548afaf749c8041cbe5f9dad22e53178857bbba6d351a5
                                • Opcode Fuzzy Hash: b402cc0d89dcfbb95b312ef96cc12808fc3cbcc453e2601e4e810a9defec9065
                                • Instruction Fuzzy Hash: 6AF0A7361006047BCF216F95DC14E87BBAEFF55730F10C11AF92946564CB31A8008B60
                                APIs
                                  • Part of subcall function 100031A0: LoadCursorA.USER32 ref: 100031E6
                                  • Part of subcall function 100031A0: RegisterClassExA.USER32 ref: 1000320D
                                • GetCurrentThreadId.KERNEL32 ref: 1001949E
                                • SetWindowsHookExA.USER32(00000004,1001A4F0,?,00000000), ref: 100194AD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ClassCurrentCursorHookLoadRegisterThreadWindows
                                • String ID:
                                • API String ID: 1908744831-0
                                • Opcode ID: 19cee74c161a8a1ef3f8c2fedae50ded263d7b6a45f83f2ca4177339b9e5c586
                                • Instruction ID: 1960aa195ee1fe07530ea21f1dd313f19c5464d8ba1e979a915d34b59bad2663
                                • Opcode Fuzzy Hash: 19cee74c161a8a1ef3f8c2fedae50ded263d7b6a45f83f2ca4177339b9e5c586
                                • Instruction Fuzzy Hash: 40F082B9A001049FE314CF58E885B9A7BE8EB88711F00812AFA0BC7340EB31A451C751
                                APIs
                                • HeapCreate.KERNEL32(00000000,00001000,00000000,00682172,00000001), ref: 0068842D
                                  • Part of subcall function 006882D4: GetVersionExA.KERNEL32 ref: 006882F3
                                • HeapDestroy.KERNEL32 ref: 0068846C
                                  • Part of subcall function 0068BCE5: HeapAlloc.KERNEL32(00000000,00000140,00688455,000003F8), ref: 0068BCF2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Heap$AllocCreateDestroyVersion
                                • String ID:
                                • API String ID: 2507506473-0
                                • Opcode ID: 93f11a5263b1ead9cc4c07324470462bcb4dc204936f8bc92a7023c5c43020e4
                                • Instruction ID: b9f3a94b30038e2f7ad65cdff3eee61adefe3ee7c9e871b1add84bff456c4b70
                                • Opcode Fuzzy Hash: 93f11a5263b1ead9cc4c07324470462bcb4dc204936f8bc92a7023c5c43020e4
                                • Instruction Fuzzy Hash: BFF09B72596303AFEFA07B745C0A76936E79B40742F504929F551C91A0EF70C681A711
                                APIs
                                • DefWindowProcA.USER32(?,?,?,?), ref: 0069756A
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 0069757F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ProcWindow$Call
                                • String ID:
                                • API String ID: 2316559721-0
                                • Opcode ID: f8e4541b742bda9d92195fa78d70fc4c29f7c3e90b2dac658db62484c40cfd57
                                • Instruction ID: b515b80a5225269020c5a7c77219b58737aa9ddb9477968b974273d1b5fa36a7
                                • Opcode Fuzzy Hash: f8e4541b742bda9d92195fa78d70fc4c29f7c3e90b2dac658db62484c40cfd57
                                • Instruction Fuzzy Hash: B0F01536204208EFCF219F94DC08DDA7BBAFF09350B048428FA4686530DB32E920EF40
                                APIs
                                  • Part of subcall function 0069FB7D: TlsGetValue.KERNEL32(00908F44,?,00000000,0069F604,0069EEF7,0069F620,0069A219,0069B4C1,?,00000000,?,00691BBF,00000000,00000000,00000000,00000000), ref: 0069FBBC
                                • GetCurrentThreadId.KERNEL32 ref: 0069719B
                                • SetWindowsHookExA.USER32(00000005,00696F83,00000000,00000000), ref: 006971AB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CurrentHookThreadValueWindows
                                • String ID:
                                • API String ID: 933525246-0
                                • Opcode ID: 43ed2762dd9d71883a69cf09b9963ceef8c4ce086f953f255cba19afeca53325
                                • Instruction ID: 3822131800f7875805c81dd21fcdabd6c19520735c469869122a1f686f915608
                                • Opcode Fuzzy Hash: 43ed2762dd9d71883a69cf09b9963ceef8c4ce086f953f255cba19afeca53325
                                • Instruction Fuzzy Hash: 29E06D31204710AFDB70AF65A805B5777EFEB94B52F05052DE28686E94D631A804CF76
                                APIs
                                • GetWindowTextLengthA.USER32(?), ref: 00697682
                                • GetWindowTextA.USER32(?,00000000,00000000), ref: 0069769A
                                  • Part of subcall function 00695636: lstrlenA.KERNEL32(?,00000104,00695E2E,000000FF), ref: 00695649
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: TextWindow$Lengthlstrlen
                                • String ID:
                                • API String ID: 288803333-0
                                • Opcode ID: f0a3ff4b6dd44f6c2cba358cde508f914b892b07ec901295d7d215c18f8181d2
                                • Instruction ID: 6cc3c7f18a0ee07f873131c05964c75bfd57a60328afb95a31a9da2e35d3b8c6
                                • Opcode Fuzzy Hash: f0a3ff4b6dd44f6c2cba358cde508f914b892b07ec901295d7d215c18f8181d2
                                • Instruction Fuzzy Hash: B4E03931108611EFCF58AF54E858CAA7BAAEF49320B148A6DB05B825B1CB31A846DB15
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 1001C3E7
                                • EnumThreadWindows.USER32(00000000), ref: 1001C3EE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Thread$CurrentEnumWindows
                                • String ID:
                                • API String ID: 2396873506-0
                                • Opcode ID: d622cf26246987ff9e9421572da9bcdcb2b88d34bd5217939b00bcf58dbb3ef1
                                • Instruction ID: 12c5552e0a4cb50a56c7161035d2123e8fa57657582dde7ac2283fab1c990b87
                                • Opcode Fuzzy Hash: d622cf26246987ff9e9421572da9bcdcb2b88d34bd5217939b00bcf58dbb3ef1
                                • Instruction Fuzzy Hash: BFB0027554511457ED1057A04D5DF95361C9744706F214440F305D50D0C67491A38755
                                APIs
                                • ??2@YAPAXI@Z.MSVCRT(00000054), ref: 1001981A
                                • ??2@YAPAXI@Z.MSVCRT(0000000C,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?,0000040C,?,?,10007AE0,?), ref: 10019EFD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??2@
                                • String ID:
                                • API String ID: 1033339047-0
                                • Opcode ID: e6a2a5606f05a9fb0a88c1fa756239c54736bf1f5f6895791adda2d0db9c1b8c
                                • Instruction ID: c51b944b100109a9c67305362f38693a89095834d3b2e72ca071cf47241c3be2
                                • Opcode Fuzzy Hash: e6a2a5606f05a9fb0a88c1fa756239c54736bf1f5f6895791adda2d0db9c1b8c
                                • Instruction Fuzzy Hash: 87019EF1A047419FD758CF28945175ABBD0FB88710F00863EE91ACB381EB34E985CB86
                                APIs
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 10024A36
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: ccc98896fe80d5754182099f52a7d0c2ef5bca29cf5af2a5b87928f1901503f8
                                • Instruction ID: 0276685cddaf8491d1b69849fc3bfca2be8f4e4163da7e6ce67b870ed928455b
                                • Opcode Fuzzy Hash: ccc98896fe80d5754182099f52a7d0c2ef5bca29cf5af2a5b87928f1901503f8
                                • Instruction Fuzzy Hash: 358163BA308350AF9144DB58E491E7FB3E9EBD8710F51CD0DF55687244CB30AC8287AA
                                APIs
                                • CallWindowProcA.USER32(?,?,00000083,?,?), ref: 100227DD
                                  • Part of subcall function 10024E80: GetWindowInfo.USER32(?), ref: 10024E99
                                  • Part of subcall function 10024E80: IsWindowVisible.USER32(?), ref: 10024F00
                                  • Part of subcall function 10024E80: OffsetRect.USER32(?,?,?), ref: 10024F39
                                  • Part of subcall function 10024E80: OffsetRect.USER32(?,?,?), ref: 10024F4E
                                  • Part of subcall function 10024E80: EqualRect.USER32(?,?), ref: 10024F66
                                  • Part of subcall function 10024E80: EqualRect.USER32(?,?), ref: 10024F78
                                  • Part of subcall function 10022FD0: GetMenuItemCount.USER32(?), ref: 10022FE9
                                  • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,00000000,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 1002300D
                                  • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,-00000001,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 10023021
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$ItemMenuWindow$EqualOffset$CallCountInfoProcVisible
                                • String ID:
                                • API String ID: 2682827658-0
                                • Opcode ID: ba77e99849152b532a34ce5233054817b3643cd4816e7d9f4adc947aa763c3b2
                                • Instruction ID: e8be41dcc1f79ff3f90e0d34badb2271f0da0451bde1e7ce2bf7accdd2581f9d
                                • Opcode Fuzzy Hash: ba77e99849152b532a34ce5233054817b3643cd4816e7d9f4adc947aa763c3b2
                                • Instruction Fuzzy Hash: 9B711374601A029FC348CF69D994A56F7E2FF88314F65862DD85E8B755DB30F892CB80
                                APIs
                                • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 00683B1C
                                  • Part of subcall function 0068AAE4: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,00684C68,00000009,00000000,00000000,00000001,00688265,00000001,00000074,?,?,00000000,00000001), ref: 0068AB21
                                  • Part of subcall function 0068AAE4: EnterCriticalSection.KERNEL32(?,?,?,00684C68,00000009,00000000,00000000,00000001,00688265,00000001,00000074,?,?,00000000,00000001), ref: 0068AB3C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CriticalSection$AllocateEnterHeapInitialize
                                • String ID:
                                • API String ID: 1616793339-0
                                • Opcode ID: 586d5748ee8e24fa5cc483c405fd088bb83d12e4d0b5ec590fbc4a704499f297
                                • Instruction ID: 6c665b126fb14f320860abff7593f12e93e482e7211c28a30169482aab3696b9
                                • Opcode Fuzzy Hash: 586d5748ee8e24fa5cc483c405fd088bb83d12e4d0b5ec590fbc4a704499f297
                                • Instruction Fuzzy Hash: 0921B072A00225ABDB14FFA8DD42BDEB7A6EB00B30F144319F420EB3C0C774AA418B54
                                APIs
                                • __EH_prolog.LIBCMT ref: 00696AE5
                                  • Part of subcall function 0069FB7D: TlsGetValue.KERNEL32(00908F44,?,00000000,0069F604,0069EEF7,0069F620,0069A219,0069B4C1,?,00000000,?,00691BBF,00000000,00000000,00000000,00000000), ref: 0069FBBC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: H_prologValue
                                • String ID:
                                • API String ID: 3700342317-0
                                • Opcode ID: 2cb5c287767a0e3608d9660cf429e3d9915ae955f5357fda776e4040163ea94f
                                • Instruction ID: c62af3ee0b618bdf6d11b39acff12718bb41d2216f75670dd16b8ee6f4e7a70a
                                • Opcode Fuzzy Hash: 2cb5c287767a0e3608d9660cf429e3d9915ae955f5357fda776e4040163ea94f
                                • Instruction Fuzzy Hash: A0215972A00209EFCF45DF54C581AEE7BBAFF48354F00406AF915ABA91D770AE55CBA0
                                APIs
                                • CallWindowProcA.USER32(?,?,00000083,?,?), ref: 100155BB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: 5d0bdd36328f84d96af1c0e60120005e76f9a7083c5701b91d0d2ef7dfa2a6cb
                                • Instruction ID: 664da86f57333d2594dda9d77ea2a9eee9da370e28bc646d6d5ed37cb1cf24e2
                                • Opcode Fuzzy Hash: 5d0bdd36328f84d96af1c0e60120005e76f9a7083c5701b91d0d2ef7dfa2a6cb
                                • Instruction Fuzzy Hash: E2212674600B02DFD354CF29C890E96BBE6EF88324F14866DA55E8B365CB31F881CB50
                                APIs
                                • CreateWindowExA.USER32(00000000,00000080,0060A461,?,?,?,?,?,?,?,?,?), ref: 006972A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreateWindow
                                • String ID:
                                • API String ID: 716092398-0
                                • Opcode ID: 3431e973c6ee7721b4726d6cf38ae1044cfe4435cf00153356f36042c0829640
                                • Instruction ID: 89b795add26894a9a9cc3edbdcf594ddb98d6ad83e90d0c26161cd7053433791
                                • Opcode Fuzzy Hash: 3431e973c6ee7721b4726d6cf38ae1044cfe4435cf00153356f36042c0829640
                                • Instruction Fuzzy Hash: 3631AA79A10219AFCF41DFA8C944ADEBBF6BF4C310F158069F908E7210E7359A519FA4
                                APIs
                                  • Part of subcall function 006996FF: GetWindowLongA.USER32(?,000000F0), ref: 0069970B
                                • SendMessageA.USER32(?,0000036E,?,00000000), ref: 00696A5D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: LongMessageSendWindow
                                • String ID:
                                • API String ID: 3360111000-0
                                • Opcode ID: 16f2af22e700e3e9cb0fc44b016c969f493ad38729b7b8db8a91875172171e29
                                • Instruction ID: f1b778f8f65b0f0b60b2b4c42a9185d79cee7c4226f8cac84d1819fbea3a0eaa
                                • Opcode Fuzzy Hash: 16f2af22e700e3e9cb0fc44b016c969f493ad38729b7b8db8a91875172171e29
                                • Instruction Fuzzy Hash: ABF06876600708AFDF019F99D8819AEB7BEFF45750F10802AF501E7650EAB0EE0187A0
                                APIs
                                • SendMessageA.USER32(?,0000202B,?,?), ref: 006987A5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: 00c7de477d3c68e90cb7b1dbdf6a4cdb4cb5811a03eb2769e98c861548ffb91e
                                • Instruction ID: b4cb42c3387a29388778933fdc4b61f1a876bb22acaba86aa71a6f70fc5c2975
                                • Opcode Fuzzy Hash: 00c7de477d3c68e90cb7b1dbdf6a4cdb4cb5811a03eb2769e98c861548ffb91e
                                • Instruction Fuzzy Hash: C6F01D36500209AFDF115E90D880BEE7B6FBF05714F244829F9196FA61CB32DD61DB50
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3a49c624c6404d3334b761d3254c05257aca3161a464cc373ff50f96c7b8dcdf
                                • Instruction ID: f5859adbba6beb3fb76db035690d017d7b937ef73763d21c178bc570cefd90d7
                                • Opcode Fuzzy Hash: 3a49c624c6404d3334b761d3254c05257aca3161a464cc373ff50f96c7b8dcdf
                                • Instruction Fuzzy Hash: 58F01C36141719FBCF125E80DC04DEA3B2EAF04361F008415FA2555860C776D565EFA5
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: H_prolog
                                • String ID:
                                • API String ID: 3519838083-0
                                • Opcode ID: f3095d2028c6c01cfb68bf7f09824238d1ba4f5b30ddeb6af8f3666f464e442a
                                • Instruction ID: 762f1f5ca4550a258250baace070c3874b74125991cfb67ea41c62d4a86239b7
                                • Opcode Fuzzy Hash: f3095d2028c6c01cfb68bf7f09824238d1ba4f5b30ddeb6af8f3666f464e442a
                                • Instruction Fuzzy Hash: A0E01A75D01208DFCB40EFA8D5056AEBBF5FB48314F20857EE405E2601E3318E02CBA1
                                APIs
                                • RtlAllocateHeap.NTDLL(00BF0000,00000000,00000008,?,?,005C0141,00000008,?), ref: 005E7D31
                                  • Part of subcall function 005DF650: wsprintfA.USER32 ref: 005DF662
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: AllocateHeapwsprintf
                                • String ID:
                                • API String ID: 1352872168-0
                                • Opcode ID: 7ca36ae2c40924570e04c368218e41a2f7c2790ce34f741881c13e587d36e006
                                • Instruction ID: 7d00a5bff9c455e5b5f60c6ff01099db412f908ef0e8c879ce949926f11e2e9b
                                • Opcode Fuzzy Hash: 7ca36ae2c40924570e04c368218e41a2f7c2790ce34f741881c13e587d36e006
                                • Instruction Fuzzy Hash: A5E0ECB590420CFBDB14DFA4ED59AAA7BB8FB48300F104659F9099B341E632EE40DB95
                                APIs
                                • CallWindowProcA.USER32(?,?,00000046,?,?), ref: 1002241D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: e3bc2e746433023f95ead78f46c0119a23b9cb0d4e988137bf02804617c1a965
                                • Instruction ID: 7a9d2a18568fca2f1777ed7b6681e46c759f9dce21c5a15a22889261b2edb605
                                • Opcode Fuzzy Hash: e3bc2e746433023f95ead78f46c0119a23b9cb0d4e988137bf02804617c1a965
                                • Instruction Fuzzy Hash: 41E092B6A00201ABD644DE98D885E52B3E9EBA8784B248058F64CCB255D236ED87DB91
                                APIs
                                • LoadStringA.USER32(?,?,?,?), ref: 0069ADB3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: LoadString
                                • String ID:
                                • API String ID: 2948472770-0
                                • Opcode ID: cffe3ade15676af77ec8942256eb73c44084609f6a31a2ebb3800ea6fa43bc10
                                • Instruction ID: caf159088dd21b6a3b54e98a9e356fe637f40e26df3717ee8465cb37cf63b4ea
                                • Opcode Fuzzy Hash: cffe3ade15676af77ec8942256eb73c44084609f6a31a2ebb3800ea6fa43bc10
                                • Instruction Fuzzy Hash: CAD0A7724083629BCB41DF609808D8FBBE9BF55320B054C4DF48083112E321D404CB62
                                APIs
                                  • Part of subcall function 1001C450: GetPropA.USER32(?,SHE), ref: 1001C463
                                  • Part of subcall function 1001C450: RemovePropA.USER32(?,SHE_A), ref: 1001C471
                                  • Part of subcall function 1001C450: SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1001C47F
                                  • Part of subcall function 1001C450: GetPropA.USER32(?,SHE), ref: 1001C48B
                                  • Part of subcall function 1001C450: IsWindowVisible.USER32(?), ref: 1001C4AF
                                  • Part of subcall function 1001C450: InvalidateRect.USER32(?,00000000,00000001,?,?,?,1001C40B,?), ref: 1001C4BD
                                  • Part of subcall function 1001C450: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,?,1001C40B,?), ref: 1001C4CE
                                • EnumChildWindows.USER32(?,1001C430,?), ref: 1001C419
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop$Window$ChildEnumInvalidateMessageRectRemoveSendVisibleWindows
                                • String ID:
                                • API String ID: 3749985120-0
                                • Opcode ID: b9a06091cf27c0a1cdba5cc864607ad6be3b95ef9907f11268cd4fc7a1c9827e
                                • Instruction ID: 9d20c7b3d0f7a05e384f27410cf9e7c35a197a4ef50129b58ecd41070bc00b86
                                • Opcode Fuzzy Hash: b9a06091cf27c0a1cdba5cc864607ad6be3b95ef9907f11268cd4fc7a1c9827e
                                • Instruction Fuzzy Hash: 1AC0127901913067E100D7089C50DDB725CEF55218F004411F94497200C334F99647E6
                                APIs
                                • SetWindowTextA.USER32(?,005EB2CA), ref: 006997A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: TextWindow
                                • String ID:
                                • API String ID: 530164218-0
                                • Opcode ID: 976511ab485e600d6d9ec136b3e4be0f1cb1690e7570aea46be81987ee12290f
                                • Instruction ID: 6efa054a5ba9f4a54e824537c5c81f017226aece51b0503c478fc3040fa1ca35
                                • Opcode Fuzzy Hash: 976511ab485e600d6d9ec136b3e4be0f1cb1690e7570aea46be81987ee12290f
                                • Instruction Fuzzy Hash: 7ED09E34604100DFCF459FA4D958A15B7B6BF94705B249968F046CA565DB32DC12EB50
                                APIs
                                • ShowWindow.USER32(?,00000004,006990B3,00000001), ref: 00699890
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ShowWindow
                                • String ID:
                                • API String ID: 1268545403-0
                                • Opcode ID: a036a09e40000de4e15da71341883008812acae4f1ff4ffb96d59ef028c14d17
                                • Instruction ID: d7e6f0df9a370c56d337c1aaf4c80bdc3c00e24676ce88f278fcb13491eb4f8e
                                • Opcode Fuzzy Hash: a036a09e40000de4e15da71341883008812acae4f1ff4ffb96d59ef028c14d17
                                • Instruction Fuzzy Hash: ACD05E306002009FCF048F20CA04A0577A2BF91304B20586CE00586561E332CC12EB00
                                APIs
                                • SendMessageA.USER32(?,000000F2,00000000,00000000), ref: 1001372D
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend
                                • String ID:
                                • API String ID: 3850602802-0
                                • Opcode ID: d102f5a994199ecbae38a8bf162942365c1c1ec884b4c8760e8e85280e29fec2
                                • Instruction ID: 7f6d1ec73a62ab110425be29495af5b6e635f02e2435d0823e1a95cbb802a244
                                • Opcode Fuzzy Hash: d102f5a994199ecbae38a8bf162942365c1c1ec884b4c8760e8e85280e29fec2
                                • Instruction Fuzzy Hash: 23B012747C0313B7FD308750CD4AF0036246700B00F30C040B308AD4C1C9E1A802CB08
                                APIs
                                • ??2@YAPAXI@Z.MSVCRT(0000045C,10025D96,?,10026268,?,?,?,?,?,?), ref: 10025D0F
                                  • Part of subcall function 10019250: 6E8E4BC0.MSVFW32 ref: 10019374
                                  • Part of subcall function 10019250: GetVersion.KERNEL32 ref: 10019392
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??2@Version
                                • String ID:
                                • API String ID: 2373634075-0
                                • Opcode ID: f27efdd1245afede06008fc464cf577d34035a28804bbbb13cb8f8ca7a3b9afa
                                • Instruction ID: 7e419e08a8c89389e48617f3b5b6180ff5c9c39a8ef321e5e2b9f2201d5a6f9d
                                • Opcode Fuzzy Hash: f27efdd1245afede06008fc464cf577d34035a28804bbbb13cb8f8ca7a3b9afa
                                • Instruction Fuzzy Hash: 29E09A787001098FE728CB78ECD4E2637E1EBD8600B21853DE90AC3292FA31E862D604
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k$U8k
                                • API String ID: 0-1719796224
                                • Opcode ID: bce7397dd8c5b39671c52a64c45bbba76e5e1e4383b3256d8ff8765c5af3f054
                                • Instruction ID: d09725406e9cb0a6d87388c560619c9d746f6ba3909d78aca6dc0c9debc3c95e
                                • Opcode Fuzzy Hash: bce7397dd8c5b39671c52a64c45bbba76e5e1e4383b3256d8ff8765c5af3f054
                                • Instruction Fuzzy Hash: A0C3C5B1E44215E7FB209A64DC86FE97B75FB04310F104198F648BA2C1EBF5AEA4CB15
                                APIs
                                • IsWindowVisible.USER32(?), ref: 10023094
                                • IsRectEmpty.USER32(?), ref: 10023107
                                • IsIconic.USER32(?), ref: 10023115
                                • IsRectEmpty.USER32(?), ref: 100231E6
                                • IsZoomed.USER32(?), ref: 100231F4
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 10023317
                                • GetMenuState.USER32(00000000), ref: 1002331E
                                • IsRectEmpty.USER32(?), ref: 100233BD
                                • SetBkMode.GDI32(?,00000001), ref: 100233CA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: EmptyRect$Menu$IconicModeStateSystemVisibleWindowZoomed
                                • String ID:
                                • API String ID: 549281773-0
                                • Opcode ID: 0859ee2c90a4b87bb8b63a2d08eab5df806f4869aada2a1f22d7c7a97dd138e1
                                • Instruction ID: d06e77375d5cb7ab1f1ac25b83a2b383d651d1881662a64e5f1b630b1572dc97
                                • Opcode Fuzzy Hash: 0859ee2c90a4b87bb8b63a2d08eab5df806f4869aada2a1f22d7c7a97dd138e1
                                • Instruction Fuzzy Hash: 1DD16CB9241B06AFE324CB64DCC4FAB73A9FF84744F60891CE55A87241E634FD468B60
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 1000601C
                                • SendMessageA.USER32(?,00000020,?,0202FFFE), ref: 10006032
                                • SendMessageA.USER32(?,000000A2,00000000,?), ref: 10006052
                                • GetWindowRect.USER32(?,?), ref: 10006062
                                • IsRectEmpty.USER32(?), ref: 1000608D
                                • PtInRect.USER32(?,?,?), ref: 100060A0
                                • GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 100060BF
                                • GetMenuState.USER32(00000000), ref: 100060C6
                                • SendMessageA.USER32(?,00000112,0000F180,?), ref: 100060F9
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,10004C8B), ref: 10006113
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageRectSendWindow$Menu$EmptyEnabledNtdllProc_StateSystem
                                • String ID:
                                • API String ID: 2671586774-0
                                • Opcode ID: f247dd20f8a3ef77669b665c33eb62aa311374e3ee6afc9b99d1d99878e1aa7b
                                • Instruction ID: db1f306a8784ca8736970017476ad2195cdbaa505f3b9dba42231a781a1f9d91
                                • Opcode Fuzzy Hash: f247dd20f8a3ef77669b665c33eb62aa311374e3ee6afc9b99d1d99878e1aa7b
                                • Instruction Fuzzy Hash: 1551AE75240716AFF320DBA5CC89FAB77EDEB88780F20492CF55683695DA34E945CB20
                                APIs
                                • KillTimer.USER32 ref: 1002198A
                                • GetMenuItemID.USER32(?,?), ref: 100219E3
                                • SendMessageA.USER32(?,00000111,00000000), ref: 100219F3
                                • CallWindowProcA.USER32(?,?,000000A2,?,?), ref: 10021A38
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallItemKillMenuMessageProcSendTimerWindow
                                • String ID:
                                • API String ID: 2515994771-0
                                • Opcode ID: 3b3b23c477d770ed4f7aa771234f3d45869d44fa6d65c12bb79bc5aa267ef81e
                                • Instruction ID: 89b724dc2ca4cdc55add286efa33b9077fff919ea1f62498a6f78f4254ff7468
                                • Opcode Fuzzy Hash: 3b3b23c477d770ed4f7aa771234f3d45869d44fa6d65c12bb79bc5aa267ef81e
                                • Instruction Fuzzy Hash: 64518179304702AFE354DB64D895FEBB3E9FB98740F50891DF696C6190CB70A886CB50
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10009350
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000936C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 9ead5d21b62799828bb9cc85ce7bf4125b4fa391575515c34ce0a3c6fe3e6a79
                                • Instruction ID: 66a860390867b69e52e3412568fee3c891a1f5c98dd500308f81789add6bf3bd
                                • Opcode Fuzzy Hash: 9ead5d21b62799828bb9cc85ce7bf4125b4fa391575515c34ce0a3c6fe3e6a79
                                • Instruction Fuzzy Hash: E941907A205600ABE200DB58DC84DABB3E8FBC4751F50491DF98683251C774ED0ACBB2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000C400
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000C41C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: d5b8f05a9e68d77798507910b0dc128c9ddebfdd8b18848f9afa2fd6e5e951aa
                                • Instruction ID: e4712fcc12151d2cebdf1b72559aff8232ef5eb8468fa4595113e4497e6478ba
                                • Opcode Fuzzy Hash: d5b8f05a9e68d77798507910b0dc128c9ddebfdd8b18848f9afa2fd6e5e951aa
                                • Instruction Fuzzy Hash: 7F419F7A205704ABE250EB58DC88D6BB7E8FBC8751F50491DF94283252C774ED0A8BB2
                                APIs
                                • GetCurrentThreadId.KERNEL32 ref: 005E0055
                                • IsWindow.USER32(00020400), ref: 005E0071
                                • SendMessageA.USER32(00020400,000083E7,?,00000000), ref: 005E008A
                                • ExitProcess.KERNEL32 ref: 005E009F
                                • FreeLibrary.KERNEL32(?), ref: 005E0183
                                • FreeLibrary.KERNEL32 ref: 005E01D7
                                • DestroyIcon.USER32(0012023F), ref: 005E0227
                                • DestroyIcon.USER32(00010403), ref: 005E023E
                                • IsWindow.USER32(00020400), ref: 005E0255
                                • DestroyIcon.USER32(?,00000001,00000000,000000FF), ref: 005E0304
                                • WSACleanup.WS2_32 ref: 005E034F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: DestroyIcon$FreeLibraryWindow$CleanupCurrentExitMessageProcessSendThread
                                • String ID:
                                • API String ID: 3816745216-0
                                • Opcode ID: 42ebcb66921771243638a6dda88637871bea3cb5f899dff8711f44241657d514
                                • Instruction ID: ffdcbe38da6ef9eaa8f6335396674c6655c4650148593162a15abbc592053156
                                • Opcode Fuzzy Hash: 42ebcb66921771243638a6dda88637871bea3cb5f899dff8711f44241657d514
                                • Instruction Fuzzy Hash: 01B17D706007429FCB28DF75C8D9BAABBE5BF88300F50592DE59AC7291DB70B981CB51
                                APIs
                                • __EH_prolog.LIBCMT ref: 0069638A
                                • FindResourceA.KERNEL32(?,00000000,00000005), ref: 006963C2
                                • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 006963CA
                                  • Part of subcall function 006971C5: UnhookWindowsHookEx.USER32(?), ref: 006971EA
                                • LockResource.KERNEL32(?,?,?,?), ref: 006963D7
                                • IsWindowEnabled.USER32(00000000), ref: 0069640A
                                • EnableWindow.USER32(00000000,00000000), ref: 00696418
                                • EnableWindow.USER32(00000000,00000001), ref: 006964A6
                                • GetActiveWindow.USER32 ref: 006964B1
                                • SetActiveWindow.USER32(00000000,?,?,?,?), ref: 006964BF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Resource$ActiveEnable$EnabledFindH_prologHookLoadLockUnhookWindows
                                • String ID:
                                • API String ID: 401145483-0
                                • Opcode ID: 63b5d490bdeaf0c745d7095f4b5e123635102f37d1a1efd775dc635f507866d9
                                • Instruction ID: e2f66decd2cd6e44b34c0ef669e47e255909020688fddda79adb10b0c7e61f93
                                • Opcode Fuzzy Hash: 63b5d490bdeaf0c745d7095f4b5e123635102f37d1a1efd775dc635f507866d9
                                • Instruction Fuzzy Hash: BA418030900715DFDF21AFA8C949AAEBBFBAF44B11F10451DF102A2A91DB769D01CFA5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ObjectSelect
                                • String ID: d
                                • API String ID: 1517587568-2564639436
                                • Opcode ID: bde552e54f32443e204c6f3d8f074d9ca5ab16db1e7efedaa453502c1c712233
                                • Instruction ID: 4b82767d9c842e9e08e3940738fc6923ca1a8521680a6cc2111a8d75eee5b889
                                • Opcode Fuzzy Hash: bde552e54f32443e204c6f3d8f074d9ca5ab16db1e7efedaa453502c1c712233
                                • Instruction Fuzzy Hash: 4A32E571A047128FD319CF14D8907AAB3E5FFC8340F558A7DE8969B291D734EA89CB42
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 100098BE
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100098DA
                                • KillTimer.USER32(?,?,00000000), ref: 10009914
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: KillNtdllProc_PropTimerWindow
                                • String ID: SHE
                                • API String ID: 3733616403-2947365353
                                • Opcode ID: 3c55ececde0a7ee3e163387940c24b6939577072ee2d8cbbac78a905ef7d04e5
                                • Instruction ID: adc7337034f0b9ec4e7ed3ed95778db363d18d8614baef39ea8ea303d17308f6
                                • Opcode Fuzzy Hash: 3c55ececde0a7ee3e163387940c24b6939577072ee2d8cbbac78a905ef7d04e5
                                • Instruction Fuzzy Hash: EF21F336305215ABE210DA54ECC4E7F77ACEBC5BE1F10451EF68293241C726AC069761
                                APIs
                                • GetCursorPos.USER32(?), ref: 10005959
                                • GetWindowRect.USER32(?,?), ref: 1000596C
                                • PtInRect.USER32(?,?,?), ref: 1000599D
                                • PtInRect.USER32(?,?,?), ref: 100059B4
                                • PtInRect.USER32(?,?,?), ref: 100059CB
                                • PtInRect.USER32(?,?,?), ref: 100059E2
                                • KillTimer.USER32(?,00006625,?,?,?,?,?,?,?,10004CEB,?,?,00000000,?,?), ref: 100059F2
                                  • Part of subcall function 10004E30: GetWindowRect.USER32(?,?), ref: 10004E5F
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,?,?,?,?,10004CEB,?,?,00000000,?,?), ref: 10005A27
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window$CursorKillNtdllProc_Timer
                                • String ID:
                                • API String ID: 1632373092-0
                                • Opcode ID: b8796e62a7e9f8a1269d68023e98339359b7a28a012fa2bbc78eefee34ee6aa6
                                • Instruction ID: 9a3ddf00fd3851daef2864d54b78be332d389b06acf702b9600ba59b9845d60c
                                • Opcode Fuzzy Hash: b8796e62a7e9f8a1269d68023e98339359b7a28a012fa2bbc78eefee34ee6aa6
                                • Instruction Fuzzy Hash: 51212CB6614302AFE314DB64CC88C6BB7E9FFC8794F008A1DF49AD3214D631E9058B62
                                APIs
                                • 73F84D40.GDI32(?,00000000,?,?,?,?,?,?,00CC0020,75756BA0,00000000,00000000,?,?,1002CDA8), ref: 1000BB67
                                • 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1000BE29
                                • 73F84D40.GDI32(?,?,?,00000020,?,?,?,?,00CC0020), ref: 1000BEF2
                                • OffsetRect.USER32(?,1000329E,000000FF), ref: 1000BFA9
                                • 73F84D40.GDI32(?,?,?,00000020,?,?,?,?,00CC0020), ref: 1000BC0B
                                  • Part of subcall function 1000B4C0: 74001530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
                                  • Part of subcall function 1000B4C0: SelectObject.GDI32(00000000,00000000), ref: 1000B55F
                                  • Part of subcall function 1000B4C0: 74001530.MSIMG32(?,?,00BD2B74,?,?,00000000,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?), ref: 1000B5BA
                                  • Part of subcall function 1000B4C0: DeleteObject.GDI32(?), ref: 1000B5C5
                                  • Part of subcall function 1000B4C0: DeleteDC.GDI32(00000000), ref: 1000B5CC
                                  • Part of subcall function 1000B5F0: 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,1000BBE1,?,?,?,?,?), ref: 1000B646
                                  • Part of subcall function 1000B120: 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B1A0
                                  • Part of subcall function 1000B120: 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B216
                                  • Part of subcall function 1000B120: 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B273
                                  • Part of subcall function 1000B120: 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B2C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: 74001530DeleteObject$OffsetRectSelect
                                • String ID: s
                                • API String ID: 3996303290-453955339
                                • Opcode ID: cac2739ba0984c5b844557e8b4f5d791b105f7fe2c822b0771468b378f7f900f
                                • Instruction ID: b631010fc7c61f0dbc485572ac6f53e1cb0354f72aed0dfdbd8fa92e86ef0b76
                                • Opcode Fuzzy Hash: cac2739ba0984c5b844557e8b4f5d791b105f7fe2c822b0771468b378f7f900f
                                • Instruction Fuzzy Hash: F872B6B5700901AFD358CE6ECE95D27F7EAEFC8610314CA1CA55EC3A5CEA30F8558A64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: EDB$EDT$ENX$WCDB$WEDB$WEDB$WEDT$WENX
                                • API String ID: 0-3140496049
                                • Opcode ID: 3db61376f8749df3261f3da93820f35f83081bfffd94b8dbca1a61c97b93d166
                                • Instruction ID: 0c5594e3ecda07ccc3b87f6a6f1b92ad5fd27dafe0c89e3b2ca7c5e71a14d704
                                • Opcode Fuzzy Hash: 3db61376f8749df3261f3da93820f35f83081bfffd94b8dbca1a61c97b93d166
                                • Instruction Fuzzy Hash: F5A2E270A0021EDBDF14DF68C885BFDBBB5BF54310F208569EA16AB281D7349E45CB91
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000831C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008338
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 76ff8970db67151db0b6f6ec3473056875dcff3a0f31a7fb73f1cb6230d5cb84
                                • Instruction ID: d5cf22ff5653e0c4365a76e3bc0a6f530f10b9ff97d098438d5549bdcf248cbb
                                • Opcode Fuzzy Hash: 76ff8970db67151db0b6f6ec3473056875dcff3a0f31a7fb73f1cb6230d5cb84
                                • Instruction Fuzzy Hash: 0E216476308612ABE204DB18EC84EAF77A9EBD8760F104919F181D7295C770ED9687B1
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001FD66
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001FD7E
                                • FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1001FDBE
                                • GetPropA.USER32(00000000,SHE), ref: 1001FDD0
                                • GetWindowRect.USER32(00000000,?), ref: 1001FDED
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Prop$FindNtdllProc_Rect
                                • String ID: SHE
                                • API String ID: 1621342347-2947365353
                                • Opcode ID: e209e126209f789dd80fe51a7b19f8c596f70caf1b5d236961e23ecb73bb45dc
                                • Instruction ID: 6b8d0221fe97fab34533167ca4c9a37e3e90209f2d168c5ada330748bbe964d0
                                • Opcode Fuzzy Hash: e209e126209f789dd80fe51a7b19f8c596f70caf1b5d236961e23ecb73bb45dc
                                • Instruction Fuzzy Hash: F83187356042009FD304DF18C888E7BB3E9FBD8654F55895DF9459B352C730EE468B66
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10006219
                                • SendMessageA.USER32(?,00000020,?,0201FFFE), ref: 1000622F
                                • SendMessageA.USER32(?,000000A3,00000000,?), ref: 10006251
                                • IsZoomed.USER32(?), ref: 10006263
                                • SendMessageA.USER32(?,00000112,0000F120,?), ref: 1000628C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000629E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$Window$EnabledNtdllProc_Zoomed
                                • String ID:
                                • API String ID: 1736178447-0
                                • Opcode ID: 31b90f1f2f4758470e2ea2747ea2563a49cebe7bfef6ce3f53ee5ca3d1f04934
                                • Instruction ID: 53ad444b2308a7bebedf1b38f9ffedf2fa5899a07a2aa37d5df76109a97d8af9
                                • Opcode Fuzzy Hash: 31b90f1f2f4758470e2ea2747ea2563a49cebe7bfef6ce3f53ee5ca3d1f04934
                                • Instruction Fuzzy Hash: E1118E35305B12EFE220CB95DC84E9BB3EDEB8CB40F20880CF68597594C670E841C764
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000871D
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008739
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 826a2f52f7e6cf888468cf574442a5b1d842237e04ebc0d74020836fc4713a4a
                                • Instruction ID: 4fac22d2b0eaef5fff40d3138b4cbdac12c866ca4beaf184c634f33bf18d14c9
                                • Opcode Fuzzy Hash: 826a2f52f7e6cf888468cf574442a5b1d842237e04ebc0d74020836fc4713a4a
                                • Instruction Fuzzy Hash: 055164763041119BE204DA48D8D4DBFB3AEEBD4392F14842BF68187296CB71EC5697B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001FEAD
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001FEC9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 5716e03bdd05c131fa1711044e4bacf8af709cbf5cb97f13cea4ef0443b835b5
                                • Instruction ID: 62426f1cfc6e2e8613ee12b2a616a1d9dd04dd25ff66616f45cf830b1ca35ad5
                                • Opcode Fuzzy Hash: 5716e03bdd05c131fa1711044e4bacf8af709cbf5cb97f13cea4ef0443b835b5
                                • Instruction Fuzzy Hash: 6341A6B77042115BE100DA58E8C4EBFB39ADBD83A1F50842FF68587252C770DC9697B5
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001163C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10011658
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 526c9ef3a2a92265fd59938002838eeed9a0dafe04fa7b4cf744bce3a05f278e
                                • Instruction ID: e71c5dea82c0fa7fedd5e34c1b30a37f09bcbf9f8200f5aed356c99c4536bfaa
                                • Opcode Fuzzy Hash: 526c9ef3a2a92265fd59938002838eeed9a0dafe04fa7b4cf744bce3a05f278e
                                • Instruction Fuzzy Hash: DB41767A7082119BD248DA08E894DAF73E9DBD8750F10491DF142CB396C770EC8A87B2
                                APIs
                                • GetPropA.USER32(?,SHE_B), ref: 10008D4C
                                • RemovePropA.USER32(?,SHE_B), ref: 10008D5E
                                • CallWindowProcA.USER32(00000000,?,?,?,?), ref: 10008D88
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008DD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: PropWindow$CallNtdllProcProc_Remove
                                • String ID: SHE_B
                                • API String ID: 167436498-881925336
                                • Opcode ID: 4fde51698650941a6b19f69bd186d707d8d7f3a0b8f26816a8294531b4babb50
                                • Instruction ID: 7f1ce935ea723094267178f469a7703aac22c69bbb9d6f32e347a6d7df6c448d
                                • Opcode Fuzzy Hash: 4fde51698650941a6b19f69bd186d707d8d7f3a0b8f26816a8294531b4babb50
                                • Instruction Fuzzy Hash: 6D11697A105511ABA241DB18DC84CBF7BADEFD5790F10491DF58183296C720AD4AC7F6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000F75C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000F778
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: d06918abb0d3f2a99f0b8790ebeffd6e64b80bf03755ea9d7ece643dea9d183d
                                • Instruction ID: 2528abf51e870a12b61f462225b441024f09dc823bf7e01d6d69a58c881fcfe4
                                • Opcode Fuzzy Hash: d06918abb0d3f2a99f0b8790ebeffd6e64b80bf03755ea9d7ece643dea9d183d
                                • Instruction Fuzzy Hash: A74177B63086119FE248DE08E865D7F73AADBD4750F10891DF14287296CB30AC8A97B6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001479C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100147B8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: aabdaddb52ba19fe15e07398bace0ccf46ff83178fe0b4999134df6da741ce6e
                                • Instruction ID: 5cef6116b7980ede2fc3cff8751f03a03dbdccd6a3174d1e1b5d14adc9a2bdd3
                                • Opcode Fuzzy Hash: aabdaddb52ba19fe15e07398bace0ccf46ff83178fe0b4999134df6da741ce6e
                                • Instruction Fuzzy Hash: 134153B67086119BD244DA18E8A5D7F73A9EBD4750F01481DF1428B3A6CF70EC8687B6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000FD5B
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000FD77
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 44a9cc59f4e6ab64c4beb2c156f6846ce86c779df6cdf7289ec6719d91925d85
                                • Instruction ID: 4488ee033ce5568a6e9b86f628f37d529af62b25991ac58fd4dce584937037cd
                                • Opcode Fuzzy Hash: 44a9cc59f4e6ab64c4beb2c156f6846ce86c779df6cdf7289ec6719d91925d85
                                • Instruction Fuzzy Hash: D9414AB63082459BE240DE54D980D7F73E9EBC4790F118C0EF5818765AC770EC8697B6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001C80C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001C828
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: f8d477e5692cdd5ca17986cf2d97dfdfc446317701b126a3d5f38e338d641d94
                                • Instruction ID: 1e50225a5a76dfa976e6c4c56d3e30440892ed78c8c68004a9b13c076068a0f2
                                • Opcode Fuzzy Hash: f8d477e5692cdd5ca17986cf2d97dfdfc446317701b126a3d5f38e338d641d94
                                • Instruction Fuzzy Hash: A13155BB7083159BD240DE58E884D6F73A9EBD4760F108C1AF5819B256C770ECCA97B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000DA9C
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000DAB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 6840023b0d9f93a644c901cc63a780c081a2c5d3ad5d97a37642cacfd9b32677
                                • Instruction ID: 228e3ab525f591684e137e6fd99d1f9435fde28c84332add3aa5917434ab564e
                                • Opcode Fuzzy Hash: 6840023b0d9f93a644c901cc63a780c081a2c5d3ad5d97a37642cacfd9b32677
                                • Instruction Fuzzy Hash: 6E31397A7042019BE100EE58E880D6F77E9DBD47A0F118C1BF6819725AC770DC8697B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001E7FC
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001E818
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 2bb6b4c9f7c8451d55efabac318bb80ec691770c947b02e026458401ab56470f
                                • Instruction ID: 8b1d6d09460b07866bb12f6193a6cd946900c67d8b00bd84724c958df11b5175
                                • Opcode Fuzzy Hash: 2bb6b4c9f7c8451d55efabac318bb80ec691770c947b02e026458401ab56470f
                                • Instruction Fuzzy Hash: 063152BA6082519BD240DE58E880DAFB7E9EBD8751F108C19F281C7252C730ECCAD7B1
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10013DAC
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10013DC8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 8ce96701103211df28a60adab9aab3bd328910b0f052636790040f0ca7b46eaf
                                • Instruction ID: 4bf817b2858c0e7a759d776878d335dbdc853776b506ffad1926632038d3614c
                                • Opcode Fuzzy Hash: 8ce96701103211df28a60adab9aab3bd328910b0f052636790040f0ca7b46eaf
                                • Instruction Fuzzy Hash: 992133BB704211ABD240DA58E884D6F77E9DBD4760F11C919F541CB296C270DCCA97B1
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10012ADB
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10012AF7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: f859cb2866e1b746edcdcea0132dc8f0da540a57dcf5b24eda86e99f76fe94e6
                                • Instruction ID: d284b80dbbabb1398f9d2070992cac2ce438575b69408aea9e9a94da9e131599
                                • Opcode Fuzzy Hash: f859cb2866e1b746edcdcea0132dc8f0da540a57dcf5b24eda86e99f76fe94e6
                                • Instruction Fuzzy Hash: 5E111FFA208212AFD244DF58E984DAB73E9EBC8750F108D09F5819B245C734EC96C7B6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10012BFC
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10012C18
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 185552ad6ea6ac270079b2802cbaebd668f86dd486cc4b8468dc4ddae3fa65e1
                                • Instruction ID: 2331f883b3d6d46fcb743b651009c8baabaccb07b2ddfb5f76acc19c2e81c812
                                • Opcode Fuzzy Hash: 185552ad6ea6ac270079b2802cbaebd668f86dd486cc4b8468dc4ddae3fa65e1
                                • Instruction Fuzzy Hash: 231154BA2082129BD204DF59E880DAFB7A9EBD4721F118C1AF641C7211C770EC96C7B1
                                APIs
                                • CoCreateInstance.OLE32(?,00000000,00000017,0087C110,00000000,0000004C,0000004C), ref: 006A309F
                                • CoCreateInstance.OLE32(?,00000000,00000007,0087C110,00000000), ref: 006A30B7
                                • OleRun.OLE32(00000000), ref: 006A30C5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreateInstance
                                • String ID: ac
                                • API String ID: 542301482-1282211480
                                • Opcode ID: 4eb9fc12876df7ef5c22458a726a79e014bad4e3e1c2fb8edac87ec5f4b1576b
                                • Instruction ID: 19af0a409033f78ac907b999797ad0ad5aec2972d0558bc35d1fb840a9967572
                                • Opcode Fuzzy Hash: 4eb9fc12876df7ef5c22458a726a79e014bad4e3e1c2fb8edac87ec5f4b1576b
                                • Instruction Fuzzy Hash: D4112E71A00218FFDB10DF90CC89F9E7BB9EB06750F208069F504EA251D6759E409F54
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001D33B
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1001D357
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 1001D386
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$CallNtdllProcProc_Prop
                                • String ID: SHE
                                • API String ID: 1641805499-2947365353
                                • Opcode ID: 46341e93d8e58ef3595aaf0da966454599506139a11b45700178d658ee10fc8e
                                • Instruction ID: 45f5a508404fa7b349f84285f489640ca45463347baf7dd885cba52e9e31337c
                                • Opcode Fuzzy Hash: 46341e93d8e58ef3595aaf0da966454599506139a11b45700178d658ee10fc8e
                                • Instruction Fuzzy Hash: 83017576205211AFD641EE68D894D9B77E9EBC8700F10CD0AF5819B209C370ED86C7B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000635B
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10006377
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 100063A3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$CallNtdllProcProc_Prop
                                • String ID: SHE
                                • API String ID: 1641805499-2947365353
                                • Opcode ID: b2e07a47a1426d67f7f142ce626aa22bb2d9af6c5e67b1305e8dc8a19f5800c8
                                • Instruction ID: b12fdf80a4ee98a0669d910f96ba9de27c494e6b3a9d2ac390c97d8e35b7d40b
                                • Opcode Fuzzy Hash: b2e07a47a1426d67f7f142ce626aa22bb2d9af6c5e67b1305e8dc8a19f5800c8
                                • Instruction Fuzzy Hash: 2A010CB6205212AFE604DE54D844CAB77E9EBC8750F10890DF58597245C730ED4687B6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000E44B
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000E465
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 1000E48F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$CallNtdllProcProc_Prop
                                • String ID: SHE
                                • API String ID: 1641805499-2947365353
                                • Opcode ID: 84638921357078577de142535a6b59ebe40062ceaa83d5b013f43905e33e93f3
                                • Instruction ID: 3a83241c110d65d65373b22bd99f22be1f6ecbda2895f89fe6f1498726ca76d1
                                • Opcode Fuzzy Hash: 84638921357078577de142535a6b59ebe40062ceaa83d5b013f43905e33e93f3
                                • Instruction Fuzzy Hash: A5F01DB6205611EFA204DF54ED44CAB77E9EBC8740F10C90DF545A7259D730EC0A87B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000656B
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10006585
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 49e39e83e9a89f6ca4b8d7cd12482889b2ec6db643a0077634f122c1e9a6dbe2
                                • Instruction ID: 5dbf9fbb83ff20062e3ed168ee9e718ee031d4db6b7bc6fcd510bc647bf1e31e
                                • Opcode Fuzzy Hash: 49e39e83e9a89f6ca4b8d7cd12482889b2ec6db643a0077634f122c1e9a6dbe2
                                • Instruction Fuzzy Hash: A8F014B5209621AFE204DF40DC84DAB73A9EFC8740F208908F58697249C770ED46CBB2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10020B7B
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10020B95
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 10020BB8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$CallNtdllProcProc_Prop
                                • String ID: SHE
                                • API String ID: 1641805499-2947365353
                                • Opcode ID: c3d1fd1e4d7f990324f643c9a0f4cf6b2b597ee975d3aeca719244d55fd90ff2
                                • Instruction ID: 8febcc7cfdc6d2d48d38ff73ec199bb7e5977764db5be9c515e8769bbb7d267c
                                • Opcode Fuzzy Hash: c3d1fd1e4d7f990324f643c9a0f4cf6b2b597ee975d3aeca719244d55fd90ff2
                                • Instruction Fuzzy Hash: BFF03CB5209611AFE204DF54E898CAB73EAEFC8610F108D0DF58583252D770EC46CBB2
                                APIs
                                • IsIconic.USER32(?), ref: 10025794
                                • IsZoomed.USER32(?), ref: 100257A2
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?,00000000,?,76C15440,1002584E,00000000), ref: 10024747
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?), ref: 10024751
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?), ref: 1002475B
                                  • Part of subcall function 10024730: ShowWindow.USER32(?,?), ref: 10024765
                                • IsRectEmpty.USER32(?), ref: 10025808
                                • IsWindowVisible.USER32(?), ref: 10025816
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Show$EmptyIconicRectVisibleZoomed
                                • String ID:
                                • API String ID: 3753707372-0
                                • Opcode ID: c1c3f4868670907c5ce2aaa56f8e4901cd67358b1a5e343eccb99875e79ee5f4
                                • Instruction ID: f748418fd072593a3d66f39f517992ca0597f05378dce08ab7b824f94379abf5
                                • Opcode Fuzzy Hash: c1c3f4868670907c5ce2aaa56f8e4901cd67358b1a5e343eccb99875e79ee5f4
                                • Instruction Fuzzy Hash: 6B213D34305B52CBE760CB35F888B9B73E8EF44786F82446DE45BDA240EB75E8418B48
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10008CBB
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10008CD7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: feaf19fdce81d9a1ca190ef1869b546541239fbc762c3de87076e7c699cb6eff
                                • Instruction ID: ba7b9a7e75b5fd1a47e67aed631709819a18bd4e2cca9f68860d5bab8b638427
                                • Opcode Fuzzy Hash: feaf19fdce81d9a1ca190ef1869b546541239fbc762c3de87076e7c699cb6eff
                                • Instruction Fuzzy Hash: CA01FFB6209212AFE640DB54E880DAF73E9EFD4740F118D0DF58197255C770ED868BB6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000CBCB
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 1000CBE7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: a25ab68950917d6236ee748f622a9537c84212b176b5efc6b59e8fcbf1fbc87d
                                • Instruction ID: 539b395f2d12ac3cc3f2cd791ecb8ee3aacd8a81aa599b83fb95c9963a22f77c
                                • Opcode Fuzzy Hash: a25ab68950917d6236ee748f622a9537c84212b176b5efc6b59e8fcbf1fbc87d
                                • Instruction Fuzzy Hash: A0F04F76108655ABE200DB48E890DAF73E8EBC5740F11CC0DF485D7216C770EC8687B2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 100214BB
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100214D5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: c35ed24f15a732a2fb9719cd40208895b9e4687b4f23d394dfac90f4a6c104ed
                                • Instruction ID: 2e47a34acdab9f8ecda0e86b8cba3aa85b6d9dc765e54781da42e49aa2a1b60d
                                • Opcode Fuzzy Hash: c35ed24f15a732a2fb9719cd40208895b9e4687b4f23d394dfac90f4a6c104ed
                                • Instruction Fuzzy Hash: 0CE0C075219651AB9204DF54E894CAB73E9EBC8700F118D0DF55593241C730AC458BB6
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10014EAB
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,1000C929,?,?,?,?), ref: 10014EC5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_PropWindow
                                • String ID: SHE
                                • API String ID: 2172124074-2947365353
                                • Opcode ID: 783af7ae8caf7b65d366def2194d219bf0924809f2022b0113ac818fb61e7c82
                                • Instruction ID: 23f51dd478920679ccafe8476a3c24c847d47fdfb480d2aa289d71b137eb8eb9
                                • Opcode Fuzzy Hash: 783af7ae8caf7b65d366def2194d219bf0924809f2022b0113ac818fb61e7c82
                                • Instruction Fuzzy Hash: 15E0C9B6219652AFA204DF54EC94CAB73EDEBC8700F118D0DF58597255CB30EC468BB6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f229e0f7b1bc2b716cd21636abe0148fcee8658066fa46abd7199e9c9d2f973e
                                • Instruction ID: 62d2a9dd47cfb5093e42ca0ad35283ce74ac17248ff4886bd7e32a2dcd1cbad8
                                • Opcode Fuzzy Hash: f229e0f7b1bc2b716cd21636abe0148fcee8658066fa46abd7199e9c9d2f973e
                                • Instruction Fuzzy Hash: 9EF03731500109ABDF01AF71DD48AAE3BBBAF11390B08C820F92AD4121DB31EA56EF61
                                APIs
                                • GetKeyState.USER32(00000010), ref: 0069A600
                                • GetKeyState.USER32(00000011), ref: 0069A609
                                • GetKeyState.USER32(00000012), ref: 0069A612
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: State
                                • String ID:
                                • API String ID: 1649606143-0
                                • Opcode ID: 7a1ba59a3d844e92cac9f2af2f84325acdade6743dc56ebdc55f36aad4a5a123
                                • Instruction ID: 4f08c5510088e2ac304b660a43776a300b92f2cf2f3ecf8e42765f45c81fca63
                                • Opcode Fuzzy Hash: 7a1ba59a3d844e92cac9f2af2f84325acdade6743dc56ebdc55f36aad4a5a123
                                • Instruction Fuzzy Hash: DBE09B3558025D9DEF5056C08A00FF46ED65B00794F0D4455EAC4AB495DEE0D8439BFB
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 100062CA
                                • SendMessageA.USER32(?,00000313,00000000,?), ref: 100062E0
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 100062F6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$EnabledMessageNtdllProc_Send
                                • String ID:
                                • API String ID: 2494340020-0
                                • Opcode ID: 29ef5c36759909998ca288fb9ceec95f70c955037747a1ce61ac65453ab41c58
                                • Instruction ID: b518878becbef3456e94c07293a0586dd5aa6203277d98abda6802a90051a15b
                                • Opcode Fuzzy Hash: 29ef5c36759909998ca288fb9ceec95f70c955037747a1ce61ac65453ab41c58
                                • Instruction Fuzzy Hash: 4FF0F879204712ABE250CF65DD48E97B7FDEBD8740F20480CB58193260C770E949CB65
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10005906
                                • EnableWindow.USER32(?,00000001), ref: 10005913
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?,?,10004C2B,?,?,?,?,?), ref: 10005929
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$EnableEnabledNtdllProc_
                                • String ID:
                                • API String ID: 1897713328-0
                                • Opcode ID: d8f3d101fd2ff192c26bcb8c68b95ec9de1c7bd83f65ef2fc7084ca5d7d2d836
                                • Instruction ID: 33976d3887a1ec7a0cf96d3802eee5120e501a190f8f2c604677c3bb47bb1761
                                • Opcode Fuzzy Hash: d8f3d101fd2ff192c26bcb8c68b95ec9de1c7bd83f65ef2fc7084ca5d7d2d836
                                • Instruction Fuzzy Hash: C5E0EC79116A22EFE201DF10DC88DAB77ACEF89751F108408F94193211C770AE068BAA
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$LockUnlock
                                • String ID:
                                • API String ID: 2502338518-0
                                • Opcode ID: a40856b629597babf818bcb987f58b3f716b85793390287df95e45dd76726979
                                • Instruction ID: 64df8c32f91eb9e734651812ab90013813c80175cdbc5348d2c06feefd775e77
                                • Opcode Fuzzy Hash: a40856b629597babf818bcb987f58b3f716b85793390287df95e45dd76726979
                                • Instruction Fuzzy Hash: 6591B6762001058BDB08DF14D8855BAF7E6FF88320B58C1ADED4E8B355EB36D885C7A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8603e78bcaa07ca77d24e34a73a2884c637ac09073518441a4a987bfb82c6653
                                • Instruction ID: 3e7f669c6039e60feda3537b35516c30f6de88b362bc946a56c18776fdd0bc6f
                                • Opcode Fuzzy Hash: 8603e78bcaa07ca77d24e34a73a2884c637ac09073518441a4a987bfb82c6653
                                • Instruction Fuzzy Hash: AD925571648B418FD329CF29C0906A7FBE2EF99304F24892DD5DB87BA2D631B845CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e85d96860ab1808ee8419e1598777b976ece19128c461c69847cd3e0e381b656
                                • Instruction ID: fba948c506b9dbbeee5f4350aa95cc812496134bb883b3df89a807fab9c4e44c
                                • Opcode Fuzzy Hash: e85d96860ab1808ee8419e1598777b976ece19128c461c69847cd3e0e381b656
                                • Instruction Fuzzy Hash: 0832C571E00246DFDF18DFA5C891BAEBBB6BF48311F244669E546A7381D730AD40CB91
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10004D01
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: NtdllProc_Window
                                • String ID:
                                • API String ID: 4255912815-0
                                • Opcode ID: 31a8e49bf0f8921b0a2aa4cc36cf9ef07e022d74f52cb5b04577164ebb7e90d0
                                • Instruction ID: 0b222c3024169f657697f4807f45d8ba6cc9b1c5df0fdb5bc05cb1375a895788
                                • Opcode Fuzzy Hash: 31a8e49bf0f8921b0a2aa4cc36cf9ef07e022d74f52cb5b04577164ebb7e90d0
                                • Instruction Fuzzy Hash: 4431A9FA618241AFD248DF58D891C2BB3E9EBD8700F54890CB69587256D731EC19CB72
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10004929
                                  • Part of subcall function 10004800: IsWindowEnabled.USER32(?), ref: 10004809
                                  • Part of subcall function 10004800: SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 1000482A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$EnabledMessageNtdllProc_Send
                                • String ID:
                                • API String ID: 2494340020-0
                                • Opcode ID: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
                                • Instruction ID: 225bf36e4a0812ad4753787a01e5a8dd77c9d750d7cfa771ec93f23d9b1118eb
                                • Opcode Fuzzy Hash: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
                                • Instruction Fuzzy Hash: CCF0B6F9618242AFE204DB54D890D2BB3E9EBC8780F118D1DB685C3265DA30ED04CB36
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10004559
                                  • Part of subcall function 10004430: IsWindowEnabled.USER32(?), ref: 10004439
                                  • Part of subcall function 10004430: SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 1000445A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$EnabledMessageNtdllProc_Send
                                • String ID:
                                • API String ID: 2494340020-0
                                • Opcode ID: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
                                • Instruction ID: 426c8d43d59635654131c640abf00cd082b32ef771906314d33d0ca2d6834fbf
                                • Opcode Fuzzy Hash: 85290e7a88c611dc07aaac6370783e7bcb03fd41bf1290a2f333ba97cf3b24a8
                                • Instruction Fuzzy Hash: B2F0B6F9618642AFE204DA54D881D2BB3E9EBC8780F518D0DB68583256DA30EC44CB36
                                APIs
                                • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10002E89
                                  • Part of subcall function 10002C90: IsWindowEnabled.USER32(?), ref: 10002C9C
                                  • Part of subcall function 10002C90: SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 10002CBD
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$EnabledMessageNtdllProc_Send
                                • String ID:
                                • API String ID: 2494340020-0
                                • Opcode ID: eafbc55fe3c2f1772681b34cb3290cd541762abe2b2c9e9570eb85c6031177f9
                                • Instruction ID: 6bebc549723526bab81e68595eedc138839718632c5911c4ede022b626121a3a
                                • Opcode Fuzzy Hash: eafbc55fe3c2f1772681b34cb3290cd541762abe2b2c9e9570eb85c6031177f9
                                • Instruction Fuzzy Hash: E8F0B6B9608242AFE604DA54D885D2BB3E9EBC8780F108D0DB685C3266D730EC44CB32
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: R
                                • API String ID: 0-1466425173
                                • Opcode ID: cd3b73b7348ff081589cfac0100b05dc96f159948ea6ee02f68d477cfa1a48d5
                                • Instruction ID: 8be94b6153ab9119319510401fc8330cfa8a6dc569db2486da79333d3fcb569b
                                • Opcode Fuzzy Hash: cd3b73b7348ff081589cfac0100b05dc96f159948ea6ee02f68d477cfa1a48d5
                                • Instruction Fuzzy Hash: E1519E5804D7C11FC3278B3888659A7BF216F57528B0F8AEBD4D08F963C249994AD7A2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6d82c935249b4d991eb2b1483091393da92c1c778db3535f608811f0d9819b57
                                • Instruction ID: 81db38a1700c373166eba62f60e211c33046af845de5b0cb69a5da3c99e5e768
                                • Opcode Fuzzy Hash: 6d82c935249b4d991eb2b1483091393da92c1c778db3535f608811f0d9819b57
                                • Instruction Fuzzy Hash: 0352B8767447095BD308CE9ACC9159EF3E3ABC8304F498A3CE955C3346EEB8E90AC655
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a339960ffb5a704b000e7367763248f18282941ed323104f3f76a1d61ee49cb0
                                • Instruction ID: 983c4fcd37887a59a0cb9d3b85b446299f8e70ed709c6495451e70af00230a31
                                • Opcode Fuzzy Hash: a339960ffb5a704b000e7367763248f18282941ed323104f3f76a1d61ee49cb0
                                • Instruction Fuzzy Hash: 1142A2377406154BEB0CCD5EC8B16BDB3D3ABC835474D463D9A5BD3782EDB8A80A8684
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Value
                                • String ID:
                                • API String ID: 3702945584-0
                                • Opcode ID: d82b6c8e176aa3948a3db742e7bced8d3c5ab277da8d1fa0aa27e7199d2c7306
                                • Instruction ID: b0691ee313e6a361c0430cd779e12b2b730a0485db04e4a6dee7a0902d6943e3
                                • Opcode Fuzzy Hash: d82b6c8e176aa3948a3db742e7bced8d3c5ab277da8d1fa0aa27e7199d2c7306
                                • Instruction Fuzzy Hash: 6D626B70E006199FDB14CF98C895FAEBBB5BF89310F24815DE806AB382D730AD45CB95
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 07396eee454c85584817cf15b8c0d006d29891ab31e0bab80244d1fd90dbd4d6
                                • Instruction ID: 93596e6502c76a15187eaa282ea5bd3d0e08f7ebc6713d694ddc07016d6b6326
                                • Opcode Fuzzy Hash: 07396eee454c85584817cf15b8c0d006d29891ab31e0bab80244d1fd90dbd4d6
                                • Instruction Fuzzy Hash: 19124A32B086154FE71CCE28C49426EB7E2EBC8394F16463EE95AD7748DA30D945CBC1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8b7103bbff9bb46e8b1c699a3fd87319a9224fc46cc9d04f049bd417a7061a11
                                • Instruction ID: 157b9e4211eebc0b11849ab779b197fa045a1ad80d6481328339103e49d09ed3
                                • Opcode Fuzzy Hash: 8b7103bbff9bb46e8b1c699a3fd87319a9224fc46cc9d04f049bd417a7061a11
                                • Instruction Fuzzy Hash: 90E1CC31E55219DEFF248FA8C9157FDBBBFBB44310F28501AD441EAA82D3748992DB90
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                • Instruction ID: f50d382940d8a071dac74b7dcc8aa6f29507da1d888404485ea76d337f176c83
                                • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                • Instruction Fuzzy Hash: 0DB15E7590020ADFDB15DF04C5D0AA8BBA2FF58324F24C2ADD81A5B346D731EE56CBA0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a01781256ee79fcf471860e977b16b7ce8c920ade3d6f3453a41c6b7b0ce33b4
                                • Instruction ID: 428467e42f7f86c7821e8e1e21e6f22a2fc9309eb635c514b15cab7e2e214c89
                                • Opcode Fuzzy Hash: a01781256ee79fcf471860e977b16b7ce8c920ade3d6f3453a41c6b7b0ce33b4
                                • Instruction Fuzzy Hash: 3C61C82914D3C15FC7874B7444661A27FB1AE1B22870E85DAC9C18F173D299AC4FEFA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e65a41849ba1dff17564a555de7faa284a3be694d3db7f60d411abc468340149
                                • Instruction ID: ac8fe5352a1e1d9cbaeca4538297fd12cb43e28c55d5f6a293b95013ae7dd433
                                • Opcode Fuzzy Hash: e65a41849ba1dff17564a555de7faa284a3be694d3db7f60d411abc468340149
                                • Instruction Fuzzy Hash: 921104B7206053839614AA2FD4F03FBA3D7EBC9321B2C436AD0828B748DE6299458700
                                APIs
                                  • Part of subcall function 1001A9C0: _mbscmp.MSVCRT ref: 1001A9D3
                                • _mbscmp.MSVCRT ref: 1001A065
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: _mbscmp
                                • String ID: #32768$#32770$Afx:$AfxControlBar$AfxFrameOrView$Button$ComboBox$ComboLBox$Edit$ListBox$MDIClient$RICHEDIT$ReBarWindow32$ScrollBar$SysAnimate32$SysDateTimePick32$SysHeader32$SysIPAddress32$SysListView32$SysMonthCal32$SysTabControl32$SysTreeView32$ToolbarWindow32$TravelBand$msctls_hotkey32$msctls_progress32$msctls_statusbar32$msctls_trackbar32$msctls_updown32
                                • API String ID: 2888065108-1725761304
                                • Opcode ID: 2db2da2f1ae1e61f1de84b9da0cee3094acc3992bba78dd0357555a99ed89133
                                • Instruction ID: 3c9746c1fec8770da351958914ea95a60552062d740270c3ce570340641db563
                                • Opcode Fuzzy Hash: 2db2da2f1ae1e61f1de84b9da0cee3094acc3992bba78dd0357555a99ed89133
                                • Instruction Fuzzy Hash: A6B1902739152923D101F2E5BCC1EEE634CDFE22A7F118032F705ED081DA36EA9682B5
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10005D4C
                                • SendMessageA.USER32(?,00000020,?,0201FFFE), ref: 10005D62
                                • GetWindowRect.USER32(?,?), ref: 10005D7B
                                • IsRectEmpty.USER32(?), ref: 10005DA1
                                • PtInRect.USER32(?), ref: 10005DB8
                                • IsZoomed.USER32(?), ref: 10005E71
                                • GetWindowLongA.USER32(?,000000F0), ref: 10005E8E
                                • SetRect.USER32(?,00000000,00000000,00000005,0000001D), ref: 10005EBB
                                • OffsetRect.USER32(?,?,?), ref: 10005ED0
                                • SetRect.USER32(?,?,00000000,?,0000001D), ref: 10005EF1
                                • SetRect.USER32(?,00000005,00000000,?,00000004), ref: 10005F0F
                                • PtInRect.USER32(?), ref: 10005F1E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window$EmptyEnabledLongMessageOffsetSendZoomed
                                • String ID: SHE_J
                                • API String ID: 3721721508-977966314
                                • Opcode ID: 1c55317af7e18a16ab680dc0c89327f4a8ef3d22245125a4e3fe7293c6f417bf
                                • Instruction ID: b63b4231ee4676df5d12ce30ad5422ad18bad84e1520a447d21eb9a6881f90ac
                                • Opcode Fuzzy Hash: 1c55317af7e18a16ab680dc0c89327f4a8ef3d22245125a4e3fe7293c6f417bf
                                • Instruction Fuzzy Hash: 5781A375204316AFF320DBA4DCC9F6B77ECEB84B81F10491DF64682194EA75EA05C761
                                APIs
                                • GetCursorPos.USER32(?), ref: 1001CC0F
                                • ScreenToClient.USER32(?,?), ref: 1001CC1E
                                • GetClientRect.USER32(?,?), ref: 1001CC57
                                • GetParent.USER32(?), ref: 1001CC61
                                • GetClassNameA.USER32(00000000,?,00000040), ref: 1001CC73
                                • _mbscmp.MSVCRT ref: 1001CC89
                                • _mbscmp.MSVCRT ref: 1001CC9C
                                • SelectObject.GDI32(00000000,00000000), ref: 1001CCDD
                                • SelectObject.GDI32(00000000,?), ref: 1001CCEC
                                • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1001CD02
                                • SetRect.USER32(?,?,?,?,?), ref: 1001CD41
                                • SetRect.USER32(?,?,?,?,?), ref: 1001CD64
                                • IsWindowEnabled.USER32(?), ref: 1001CD6A
                                • PtInRect.USER32(?,?,?), ref: 1001CD8D
                                • PtInRect.USER32(?,?,?), ref: 1001CE0C
                                • PtInRect.USER32(?,?,?), ref: 1001CFDF
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 1001D0F1
                                • DeleteDC.GDI32(00000000), ref: 1001D0F8
                                • DeleteObject.GDI32(?), ref: 1001D103
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Object$ClientDeleteSelect_mbscmp$ClassCursorEnabledNameParentScreenWindow
                                • String ID: DTPicker20WndClass$SysDateTimePick32$s
                                • API String ID: 1246724160-92371016
                                • Opcode ID: c2ef48b3f6ec4ec22484b2a45e11998c80fbc2def04bd750a7d1df5ab2a244b6
                                • Instruction ID: 3e656c1c5e6747a07933068c804b643b2a797f552276aae395ead9c06b7a3bed
                                • Opcode Fuzzy Hash: c2ef48b3f6ec4ec22484b2a45e11998c80fbc2def04bd750a7d1df5ab2a244b6
                                • Instruction Fuzzy Hash: 20F159B9204204AFE304DB54CC85EABB3ADFFC8744F148A69F95887355D634EE46CB61
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window
                                • String ID: SHE_J
                                • API String ID: 924285169-977966314
                                • Opcode ID: 10a71a3ec35c7868adf77ffbb036b0aa99efc379083cf3b09a92fc681535840c
                                • Instruction ID: 9d0981d9d4456fe75954a96ff124bc768ed38601b0fc248c18501ffb98e7e012
                                • Opcode Fuzzy Hash: 10a71a3ec35c7868adf77ffbb036b0aa99efc379083cf3b09a92fc681535840c
                                • Instruction Fuzzy Hash: BDB1B276600305ABE360CBA9ECC4EE7B7ECEBD8790F51492EF859C6240D635E949C760
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1001D44A
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                • SetBkMode.GDI32(?,00000001), ref: 1001D4A3
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • SelectObject.GDI32(?,00000000), ref: 1001D4B8
                                • SendMessageA.USER32(?,00000406,00000000,00000000), ref: 1001D4E1
                                • IsRectEmpty.USER32(?), ref: 1001D4FA
                                • SendMessageA.USER32(?,0000040A,00000000,?), ref: 1001D55E
                                • SendMessageA.USER32(?,00000414,00000000,00000000), ref: 1001D56B
                                • GetIconInfo.USER32(00000000,?), ref: 1001D580
                                • GetObjectA.GDI32(?,00000018,?), ref: 1001D598
                                • DrawIconEx.USER32(?,?,?,00000000,?,?,00000000,00000000,00000003), ref: 1001D5D1
                                • DeleteObject.GDI32(?), ref: 1001D5E5
                                • DeleteObject.GDI32(?), ref: 1001D5EF
                                • SendMessageA.USER32(?,00000403,00000000,00000000), ref: 1001D60E
                                • ??2@YAPAXI@Z.MSVCRT(00000001,?,?,?,?,?,?,?,00000000), ref: 1001D622
                                • SendMessageA.USER32(?,00000402,00000001,00000000), ref: 1001D64B
                                • SetTextColor.GDI32(?,?), ref: 1001D674
                                • DrawTextA.USER32(?,00000000,?,?,00000024), ref: 1001D694
                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,00000024,?,?,?,?,?,?,?,?,00000000), ref: 1001D69B
                                • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 1001D6EB
                                • GetParent.USER32(?), ref: 1001D726
                                • IsWindowEnabled.USER32(?), ref: 1001D732
                                • SendMessageA.USER32(00000000,0000002B,00000000,?), ref: 1001D775
                                • SelectClipRgn.GDI32(?,00000000), ref: 1001D7BC
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,000000F0,?,00000000), ref: 1001D83D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$Object$Select$ClipDeleteRect$DrawIconText$??2@??3@ClientColorCreateEmptyEnabledInfoModeParentPropWindow
                                • String ID: s
                                • API String ID: 332510004-453955339
                                • Opcode ID: 81f81083b6e7c4d168103e5f7740c43e00f37b7134bee56763b3c919f4d90482
                                • Instruction ID: 90df3fa2a803067d4cdad2171947ebf974ab48cb4e9fe13901dbc3d04bca41ca
                                • Opcode Fuzzy Hash: 81f81083b6e7c4d168103e5f7740c43e00f37b7134bee56763b3c919f4d90482
                                • Instruction Fuzzy Hash: D1D10675604341AFE354DF68C884E6BB7E9FBC8700F148A2DF68987291DB70E945CB62
                                APIs
                                • SendMessageA.USER32(?), ref: 10014BF2
                                • CallWindowProcA.USER32(?,?,00000001,?,?), ref: 10014C13
                                • CallWindowProcA.USER32(?,?,00000001,00000000,?), ref: 10014C38
                                • IsWindowVisible.USER32(?), ref: 10014C42
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 10014C54
                                • GetWindowRect.USER32(?,000000F0), ref: 10014C87
                                • GetParent.USER32(?), ref: 10014C9D
                                • ScreenToClient.USER32(00000000), ref: 10014CA6
                                • GetParent.USER32(?), ref: 10014CB1
                                • ScreenToClient.USER32(00000000), ref: 10014CB4
                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 10014CE7
                                • GetWindowRect.USER32(?,000000F0), ref: 10014CF6
                                • GetParent.USER32(?), ref: 10014D1C
                                • ScreenToClient.USER32(00000000), ref: 10014D25
                                • GetParent.USER32(?), ref: 10014D30
                                • ScreenToClient.USER32(00000000), ref: 10014D33
                                • GetWindowRect.USER32(?,000000F0), ref: 10014D72
                                • GetParent.USER32(?), ref: 10014D88
                                • ScreenToClient.USER32(00000000), ref: 10014D91
                                • GetParent.USER32(?), ref: 10014D9C
                                • ScreenToClient.USER32(00000000), ref: 10014D9F
                                • GetParent.USER32(?), ref: 10014DE5
                                • ScreenToClient.USER32(00000000), ref: 10014DEE
                                • GetParent.USER32(?), ref: 10014DF9
                                • ScreenToClient.USER32(00000000), ref: 10014DFC
                                • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 10014E2F
                                • GetWindowRect.USER32(?,000000F0), ref: 10014E3E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$ClientParentScreen$Rect$CallMoveProc$InvalidateMessageSendVisible
                                • String ID:
                                • API String ID: 1330197011-0
                                • Opcode ID: 27cd31995633851774bee205df8a30004b9258d202a727f50e8ef6ab539021a8
                                • Instruction ID: c47097b4e2208499dd9ef6fa9ca82aafd1a7c7d366bf9be39b5b8423eecfa7f7
                                • Opcode Fuzzy Hash: 27cd31995633851774bee205df8a30004b9258d202a727f50e8ef6ab539021a8
                                • Instruction Fuzzy Hash: 67A139B52047069FE314CF65C884F6BB7E9EBC8704F11891CF599972A0DA74F98ACB60
                                APIs
                                  • Part of subcall function 10022FD0: GetMenuItemCount.USER32(?), ref: 10022FE9
                                  • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,00000000,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 1002300D
                                  • Part of subcall function 10022FD0: GetMenuItemRect.USER32(?,?,-00000001,?,?,?,?,100250E4,00040024,?,00000000,?), ref: 10023021
                                • SetRectEmpty.USER32(?), ref: 100252A5
                                • SetRectEmpty.USER32(?), ref: 100252AE
                                • SetRectEmpty.USER32(?), ref: 100252B7
                                • SetRectEmpty.USER32(?), ref: 100252C0
                                • SetRectEmpty.USER32(?), ref: 100253EE
                                • SetRectEmpty.USER32(?), ref: 100253F7
                                • IsRectEmpty.USER32(?), ref: 10025400
                                • IsRectEmpty.USER32(?), ref: 1002540B
                                • SetRectEmpty.USER32(?), ref: 100254E0
                                • SetRectEmpty.USER32(?), ref: 1002552F
                                • SetRectEmpty.USER32(?), ref: 10025538
                                • SetRectEmpty.USER32(?), ref: 10025541
                                • SetRectEmpty.USER32(?), ref: 1002554A
                                • SetRectEmpty.USER32(?), ref: 10025553
                                • IsRectEmpty.USER32(?), ref: 1002556E
                                • IsRectEmpty.USER32(?), ref: 100255B6
                                • IsRectEmpty.USER32(?), ref: 100255C3
                                • SetRectEmpty.USER32(?), ref: 1002561A
                                • SetRectEmpty.USER32(?), ref: 10025623
                                • SetRectEmpty.USER32(?), ref: 1002562C
                                • SetRectEmpty.USER32(?), ref: 10025635
                                • SetRectEmpty.USER32(?), ref: 1002563E
                                • SetRectEmpty.USER32(?), ref: 10025647
                                • GetMenuItemCount.USER32(?), ref: 100256E8
                                • GetMenuItemRect.USER32(?,?,00000000,?,?,?,?,?,?,?,1002388F,?), ref: 10025708
                                • GetMenuItemRect.USER32(?,?,-00000001,?,?,?,?,?,?,?,1002388F,?), ref: 1002571C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Empty$ItemMenu$Count
                                • String ID:
                                • API String ID: 3556175780-0
                                • Opcode ID: 51b63d87aa26e79ce635bc53da4e79dd0ac5e2a0a2ba4a142e7e1ecfd1e9703b
                                • Instruction ID: 3580b85264a0b11b2af6f932b74e5bb24bd1c90a80f22c94ed852e82d06a07f9
                                • Opcode Fuzzy Hash: 51b63d87aa26e79ce635bc53da4e79dd0ac5e2a0a2ba4a142e7e1ecfd1e9703b
                                • Instruction Fuzzy Hash: 4D12CF75605B058FC368CB28D888AE6B7E5FF88305F65896ED8AF87315DB31B841CB44
                                APIs
                                • GetClientRect.USER32(?,?), ref: 10011B62
                                • SendMessageA.USER32(?,00001009,00000000,?), ref: 10011B78
                                • InflateRect.USER32(?,00000000,00000005), ref: 10011BE9
                                • SetRect.USER32(00000060,?,?,?,?), ref: 10011CC0
                                • SetRect.USER32(00000050,?,?,?,?), ref: 10011CDE
                                • InflateRect.USER32(00000050,00000004,00000004), ref: 10011CEB
                                • InflateRect.USER32(00000060,00000004,00000004), ref: 10011CF2
                                • SetRectEmpty.USER32(00000050), ref: 10011D0E
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011D49
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011D8D
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011DE0
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011E17
                                • IsRectEmpty.USER32(00000050), ref: 10011E2F
                                • InflateRect.USER32(00000050,00000001,00000001), ref: 10011E3E
                                • SetRectEmpty.USER32(?), ref: 10011E62
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011E95
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011EC9
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011F14
                                • SendMessageA.USER32(?,0000100E,00000000,00000020), ref: 10011F45
                                • IsRectEmpty.USER32(?), ref: 10011F61
                                • InflateRect.USER32(?,00000001,00000001), ref: 10011F78
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$MessageSend$Inflate$Empty$Client
                                • String ID:
                                • API String ID: 1339602669-3916222277
                                • Opcode ID: c0bd68143ee354b4ca45915280152967c7e5e1a2a28bd3c8534a58b4e74df048
                                • Instruction ID: a0f7648be8e36038d2b16f179121c650e50f05b29048d1dfe480584c03a9469a
                                • Opcode Fuzzy Hash: c0bd68143ee354b4ca45915280152967c7e5e1a2a28bd3c8534a58b4e74df048
                                • Instruction Fuzzy Hash: 21E17D752087069FD318CF29C9C1A9AB7E6FBC8344F144A2DF585DB251D7B0E886CB52
                                APIs
                                • IsWindowVisible.USER32(?), ref: 1002399F
                                • IsRectEmpty.USER32(?), ref: 100239B4
                                • SetBkMode.GDI32 ref: 10023A30
                                • SelectObject.GDI32(?,?), ref: 10023A4D
                                • SelectObject.GDI32(?,?), ref: 10023A5D
                                • SetTextColor.GDI32(?,?), ref: 10023AAD
                                • 73F84D40.GDI32(?,00000000,00000000,?,00000001,00000000,?,?,00CC0020), ref: 10023AE3
                                • GetMenuItemCount.USER32(00000000), ref: 10023B2A
                                • GetMenuItemInfoA.USER32(00000000,00000000,00000400,?), ref: 10023B88
                                  • Part of subcall function 10024DB0: GetMenuItemRect.USER32(?,00000000,?,?,?,?,75756D90,00000000,10023B9B,00000000,?), ref: 10024DCB
                                  • Part of subcall function 10024DB0: OffsetRect.USER32(?,?,?), ref: 10024DF9
                                • InflateRect.USER32(?,000000FF,000000FF), ref: 10023BC7
                                • SetTextColor.GDI32(?,?), ref: 10023BEF
                                • SetTextColor.GDI32(?,?), ref: 10023C25
                                • SetTextColor.GDI32(?,?), ref: 10023C69
                                • DrawTextA.USER32(?,?,?,?,00000025), ref: 10023C8B
                                • SetTextColor.GDI32(?,?), ref: 10023C9B
                                • DrawIconEx.USER32(?,?,?,00000000,00000010,00000010,00000000,00000000,00000003), ref: 10023CE9
                                • GetSystemMetrics.USER32(00000020), ref: 10023CFE
                                • OffsetRect.USER32(?,00000000), ref: 10023D19
                                • 73F84D40.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 10023E64
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Text$ColorRect$ItemMenu$DrawObjectOffsetSelect$CountEmptyIconInflateInfoMetricsModeSystemVisibleWindow
                                • String ID: 0$s
                                • API String ID: 2055320636-3821993378
                                • Opcode ID: 37e9a5e0e2e580665de7cd9a3032d2bb2df789812bb621c82e55d9ffef3a9a1e
                                • Instruction ID: a9acdb67b72450ec93636fc2c6a84ac6b9940729399217752d96d5b5a37b2c08
                                • Opcode Fuzzy Hash: 37e9a5e0e2e580665de7cd9a3032d2bb2df789812bb621c82e55d9ffef3a9a1e
                                • Instruction Fuzzy Hash: 5DF14975204741AFE354CF28D885FABB3E9FB88704F608A2DF95997290DB30E906CB51
                                APIs
                                • GetWindowRect.USER32(?,00000000), ref: 10010213
                                • GetClientRect.USER32(?,?), ref: 10010222
                                • ClientToScreen.USER32(?,?), ref: 10010237
                                • ClientToScreen.USER32(?,?), ref: 10010242
                                • SetBkMode.GDI32(?,00000001), ref: 10010281
                                • SelectObject.GDI32(?,?), ref: 10010299
                                • ClientToScreen.USER32(?,?), ref: 100102EA
                                • MenuItemFromPoint.USER32(00000000,?,?,?), ref: 100102FB
                                • GetMenuItemRect.USER32(?,?,00000000,?), ref: 10010325
                                • GetMenuItemRect.USER32(?,?,00000000,?), ref: 1001033D
                                • GetMenuItemCount.USER32(?), ref: 10010357
                                • GetMenuItemRect.USER32(?,?,00000000,?), ref: 10010389
                                • OffsetRect.USER32(?,?,?), ref: 100103AC
                                • GetMenuItemInfoA.USER32 ref: 10010419
                                • SetRect.USER32(?,?,?,?,?), ref: 1001053E
                                • SetRect.USER32(?,?,?,?,?), ref: 10010564
                                • OffsetRect.USER32(?,?,?), ref: 10010579
                                • OffsetRect.USER32(?,?,?), ref: 10010591
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1001060C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$ItemMenu$Client$OffsetScreen$CountFromInfoModeObjectPointSelectWindow
                                • String ID: 0$s
                                • API String ID: 303195050-3821993378
                                • Opcode ID: 89fcb85ae9aa16eb442b25c4fe38410ef75d27222e2efcb4e3de1833d90adcb3
                                • Instruction ID: 6d8a838f2cf942f80ceea1e64f1f331affabfdd12ad0cf7db43c7e0335608dc7
                                • Opcode Fuzzy Hash: 89fcb85ae9aa16eb442b25c4fe38410ef75d27222e2efcb4e3de1833d90adcb3
                                • Instruction Fuzzy Hash: 56E113B5208345AFE354CF68C884E6BB7E9FBC8744F108A1DF58A83254DB74E945CB62
                                APIs
                                • CreateRectRgn.GDI32(00000000,00000000,1002CDA8,?), ref: 10003521
                                • SelectObject.GDI32(?,?), ref: 10003586
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000003), ref: 100035F1
                                • SelectObject.GDI32(?,?), ref: 10003791
                                • OffsetRgn.GDI32(00000000,?,0000001D), ref: 1000380A
                                • CombineRgn.GDI32(00000000,00000000,?,00000003), ref: 10003819
                                • DeleteObject.GDI32(?), ref: 10003824
                                • SetRect.USER32(?,00000000,00000000,00000000,00000005), ref: 1000385B
                                • SelectObject.GDI32(?,?), ref: 100038A2
                                • SelectObject.GDI32(?,?), ref: 100038EF
                                • SelectObject.GDI32(?,?), ref: 100037DD
                                  • Part of subcall function 1001C210: ExtCreateRegion.GDI32(00000000,00000062,00000000), ref: 1001C3B3
                                  • Part of subcall function 1001C210: GlobalUnlock.KERNEL32(00000000), ref: 1001C3BC
                                  • Part of subcall function 1001C210: GlobalFree.KERNEL32(00000000), ref: 1001C3C3
                                • OffsetRgn.GDI32(00000000,00000000,?), ref: 10003918
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000003), ref: 10003923
                                • DeleteObject.GDI32(00000000), ref: 1000392A
                                • DeleteObject.GDI32(?), ref: 100035FC
                                  • Part of subcall function 10006920: DeleteObject.GDI32(?), ref: 1000692E
                                • SelectObject.GDI32(?,?), ref: 100035D2
                                  • Part of subcall function 1001C210: GlobalAlloc.KERNEL32(00000002,00000660,75756BA0,00000000,00000000,?,?,?,10003905,?,00000000,?,1002CDA8,?,1002CDC8), ref: 1001C227
                                  • Part of subcall function 1001C210: GlobalLock.KERNEL32(00000000), ref: 1001C230
                                  • Part of subcall function 1001C210: SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
                                  • Part of subcall function 1001C210: GlobalUnlock.KERNEL32(00000000), ref: 1001C2EB
                                  • Part of subcall function 1001C210: GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
                                  • Part of subcall function 1001C210: GlobalLock.KERNEL32(00000000), ref: 1001C316
                                  • Part of subcall function 1001C210: SetRect.USER32(?,?,?,?,?), ref: 1001C339
                                • SelectObject.GDI32(?,?), ref: 10003683
                                • SelectObject.GDI32(?,?), ref: 100036CF
                                • OffsetRgn.GDI32(00000000,00000000,0000001D), ref: 100036F2
                                • CombineRgn.GDI32(00000000,00000000,?,00000003), ref: 10003701
                                • DeleteObject.GDI32(?), ref: 1000370C
                                • SetRect.USER32(?,00000000,00000000,00000005,?), ref: 10003753
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$Global$DeleteRect$Combine$Offset$AllocCreateLockUnlock$FreeRegion
                                • String ID:
                                • API String ID: 3906817788-0
                                • Opcode ID: 28d03ff82f9fef2848c515fd377fc677e97226a5aac8fcd684cd577ae0ea30f7
                                • Instruction ID: 7ad6e692fdaee63a5d88ca3bc9fb50060419e0f4e25ce673a8ec1ac2766f1ee5
                                • Opcode Fuzzy Hash: 28d03ff82f9fef2848c515fd377fc677e97226a5aac8fcd684cd577ae0ea30f7
                                • Instruction Fuzzy Hash: B8D107B9504318AFE354CFA4CD84D6BBBE9FB88740F204A1DF55987264D770E906CBA2
                                APIs
                                • EqualRect.USER32(1000AEEB,?), ref: 1000AF0A
                                • IsRectEmpty.USER32(?), ref: 1000AF21
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF49
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF61
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000AF6A
                                • SelectClipRgn.GDI32(?,00000000), ref: 1000AF72
                                • DeleteObject.GDI32(00000000), ref: 1000AF7F
                                • DeleteObject.GDI32(00000000), ref: 1000AF82
                                • CreatePen.GDI32(00000000,00000001,?), ref: 1000AFA1
                                • CreatePen.GDI32(00000000,00000001,?), ref: 1000AFD6
                                • CreatePen.GDI32(00000000,00000001,?), ref: 1000B008
                                • CreateSolidBrush.GDI32(?), ref: 1000B041
                                • SelectObject.GDI32(?,00000000), ref: 1000B051
                                • SelectObject.GDI32(?,00000000), ref: 1000B059
                                • Rectangle.GDI32(?,?,?,?,?), ref: 1000B074
                                • SelectObject.GDI32(?,?), ref: 1000B080
                                • SelectObject.GDI32(?,?), ref: 1000B088
                                • IsRectEmpty.USER32(?), ref: 1000B08F
                                • SelectClipRgn.GDI32(?,00000000), ref: 1000B09B
                                • DeleteObject.GDI32(00000000), ref: 1000B0A8
                                • DeleteObject.GDI32(00000000), ref: 1000B0AB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$CreateSelect$Rect$Delete$ClipEmpty$BrushCombineEqualRectangleSolid
                                • String ID:
                                • API String ID: 1312918531-0
                                • Opcode ID: 37fa40e2efc1a56c945f34d09480b679d3446cfe2338074c795da41fd2fd06c2
                                • Instruction ID: ed92dcb72f46cb93286c5d67c269e6d90022c8bc6c11db7440066506c94aadbf
                                • Opcode Fuzzy Hash: 37fa40e2efc1a56c945f34d09480b679d3446cfe2338074c795da41fd2fd06c2
                                • Instruction Fuzzy Hash: 2D515779205215AFE244DBA4CCC4E6BB7E9FFC8744F208A19FA0597260D770ED46CBA1
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 10013F4E
                                • OffsetRect.USER32(?,?,?), ref: 10013F67
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                • SetBkMode.GDI32(?,00000001), ref: 10013F9A
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • SelectObject.GDI32(?,00000000), ref: 10013FB5
                                • SelectObject.GDI32(?,?), ref: 10013FC9
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 10013FED
                                • SendMessageA.USER32(?,0000040C,00000000,00000000), ref: 1001400F
                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 10014027
                                • SetRectEmpty.USER32(00000000), ref: 10014046
                                • SendMessageA.USER32(?,00000409,00000000,00000000), ref: 1001405B
                                • SendMessageA.USER32 ref: 10014247
                                • SetRect.USER32(?,?,?,?,?), ref: 1001431F
                                • DrawTextA.USER32(?,?,?,?,00000025), ref: 10014469
                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10014484
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 100144FE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$MessageObjectSelectSend$Clip$??2@??3@CreateDeleteDrawEmptyModeOffsetPropTextWindow
                                • String ID: P$s
                                • API String ID: 2997811249-2870556290
                                • Opcode ID: 6bf5f1eede09a990148878d6f040693836f70d3ed6ccbac3a398924fc484e971
                                • Instruction ID: 667f0b52e11a95e24b10ca477dcf0e066d8db5c2e0f9aabd908416b331fe757d
                                • Opcode Fuzzy Hash: 6bf5f1eede09a990148878d6f040693836f70d3ed6ccbac3a398924fc484e971
                                • Instruction Fuzzy Hash: 831269756043019FD314CF58C880A6AB7E6FFC8704F258A1DF6998B361DA71EC86CB52
                                APIs
                                • GetWindowRect.USER32(?,00000020), ref: 100201C0
                                • OffsetRect.USER32(00000020,00000000,?), ref: 100201D2
                                • SelectObject.GDI32(00000000,00000000), ref: 100201FC
                                • SelectObject.GDI32(00000000,?), ref: 1002020B
                                • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1002021F
                                  • Part of subcall function 10020700: SendMessageA.USER32(?,0000041A,00000000,00000044), ref: 1002071E
                                  • Part of subcall function 10020700: SendMessageA.USER32(?,00000419,00000000,00000034), ref: 1002072F
                                  • Part of subcall function 10020700: GetClientRect.USER32(?,?), ref: 10020749
                                • IsWindowEnabled.USER32(?), ref: 1002024C
                                • IsWindowEnabled.USER32(?), ref: 1002028A
                                • GetFocus.USER32 ref: 100202CF
                                • IsWindowEnabled.USER32(?), ref: 10020411
                                • IsWindowEnabled.USER32(?), ref: 1002044B
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 100205BD
                                • DeleteObject.GDI32(?), ref: 100205C8
                                • DeleteDC.GDI32(00000000), ref: 100205CF
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Enabled$ObjectRect$DeleteMessageSelectSend$ClientFocusOffset
                                • String ID: s
                                • API String ID: 750652982-453955339
                                • Opcode ID: 5b169589681542832a6b021b38e202f014957ac69c21412b49005b06810db579
                                • Instruction ID: 94777b03be6e9f1ae59e0413948786f371ff679d45ed1d23647022047fdc10e1
                                • Opcode Fuzzy Hash: 5b169589681542832a6b021b38e202f014957ac69c21412b49005b06810db579
                                • Instruction Fuzzy Hash: 91C138B9200715DFE364CB54DCC1EAB73AAFF88740F618969FA0587762D634ED418B60
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 1000DF29
                                • OffsetRect.USER32(?,?,?), ref: 1000DF42
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                • SetBkMode.GDI32(?,00000001), ref: 1000DF94
                                  • Part of subcall function 10012060: GetPropA.USER32(?,SHE_I), ref: 1001206C
                                  • Part of subcall function 10012060: SendMessageA.USER32(?,00000031,?,?), ref: 10012090
                                • SelectObject.GDI32(?,00000000), ref: 1000DFA9
                                • IsWindowEnabled.USER32(?), ref: 1000DFB3
                                • SendMessageA.USER32(?,00001209,00000000,00000000), ref: 1000DFCE
                                • SendMessageA.USER32 ref: 1000DFFA
                                • SendMessageA.USER32(?,0000120F,?,00000000), ref: 1000E02B
                                • SendMessageA.USER32(?,00001203,00000000,?), ref: 1000E03E
                                • SendMessageA.USER32(?,00001207,00000000,?), ref: 1000E04F
                                • 6FA9CFD0.COMCTL32(?,?,?,?,?,00000001,?,?,?,00001200,00000000,00000000), ref: 1000E156
                                • SetTextColor.GDI32(?,?), ref: 1000E1A9
                                • DrawTextA.USER32(?,?,?,?,00000024), ref: 1000E1D4
                                • 73F84D40.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 1000E210
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$ObjectRectSelect$ClipTextWindow$ColorCreateDeleteDrawEnabledModeOffsetProp
                                • String ID: 7$s
                                • API String ID: 2257661393-3867274023
                                • Opcode ID: 209c6b230ae2945e32d27e986554ab5b0cf3fdf4ca1b30fa4d1875b4f07b6efb
                                • Instruction ID: d6cd2112b19415e89498b4abe21e6ca38dab58f18fec7e0c69950289425e1392
                                • Opcode Fuzzy Hash: 209c6b230ae2945e32d27e986554ab5b0cf3fdf4ca1b30fa4d1875b4f07b6efb
                                • Instruction Fuzzy Hash: 58A14A75208341AFE314CF24C884F6BB7E9EBC8744F108A1CF599973A1DA75E945CB62
                                APIs
                                • GetClientRect.USER32(?,?), ref: 10009562
                                • GetWindowRect.USER32(?,?), ref: 10009571
                                • ClientToScreen.USER32(?,?), ref: 10009586
                                • ClientToScreen.USER32(?,?), ref: 10009591
                                • OffsetRect.USER32(?,?,?), ref: 100095AC
                                • OffsetRect.USER32(?,?,?), ref: 100095C1
                                • IsWindowEnabled.USER32(?), ref: 100095D2
                                • GetFocus.USER32 ref: 100095E0
                                • FindWindowExA.USER32(?,00000000,msvb_lib_updown,00000000), ref: 1000964D
                                • FindWindowExA.USER32(?,00000000,msctls_updown32,00000000), ref: 10009662
                                • SelectObject.GDI32(00000000,?), ref: 100096C6
                                • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 100096E8
                                • IsWindowEnabled.USER32(?), ref: 100096F2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Rect$Client$EnabledFindOffsetScreen$FocusObjectSelect
                                • String ID: msctls_updown32$msvb_lib_updown
                                • API String ID: 995514740-3795123653
                                • Opcode ID: 82dd0a023d1e9244c0f8f06e9f0e271506f95df6bee9012c3d74dd2b6a11903f
                                • Instruction ID: 219e8067712f3e67318549e0e7e2ffd899cab36933d0d05de9bc9511727c2731
                                • Opcode Fuzzy Hash: 82dd0a023d1e9244c0f8f06e9f0e271506f95df6bee9012c3d74dd2b6a11903f
                                • Instruction Fuzzy Hash: BB6115B8204702AFE314DF69C880E6BB7E8FF88744B208A5DF94987355D735E946CB61
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 1000CE96
                                • OffsetRect.USER32(?,?,?), ref: 1000CEAF
                                • GetClientRect.USER32(?,?), ref: 1000CEC1
                                • SelectObject.GDI32(?,?), ref: 1000CEFA
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 1000CF18
                                • SetMapMode.GDI32(?,00000001), ref: 1000CF24
                                • SetWindowOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1000CF34
                                • SetWindowExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000CF44
                                • SetViewportOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1000CF54
                                • SetViewportExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000CF64
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,?,?,?,?,?,?), ref: 1000CFB5
                                  • Part of subcall function 1000FC70: SelectObject.GDI32(?,?), ref: 1000FC7A
                                  • Part of subcall function 1000FC70: DeleteDC.GDI32 ref: 1000FC83
                                  • Part of subcall function 1000FC70: DeleteObject.GDI32(?), ref: 1000FC8D
                                  • Part of subcall function 1000E340: SelectObject.GDI32(?,?), ref: 1000E3AA
                                  • Part of subcall function 1000E340: DeleteDC.GDI32(?), ref: 1000E3B4
                                  • Part of subcall function 1000E340: DeleteObject.GDI32(?), ref: 1000E3D1
                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 1000D017
                                • InvalidateRect.USER32(?,00000000,00000001), ref: 1000D031
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$DeleteRect$SelectWindow$Viewport$??3@ClientInvalidateModeOffset
                                • String ID: s
                                • API String ID: 648218233-453955339
                                • Opcode ID: 47ef9256d5867152c693d037c591e560f0a365e510b02cba8d0e83b7b33722bb
                                • Instruction ID: 2f10df49a190d83ca2c48d706accd39583ccff9776fc3dcd98fdd01acb908c43
                                • Opcode Fuzzy Hash: 47ef9256d5867152c693d037c591e560f0a365e510b02cba8d0e83b7b33722bb
                                • Instruction Fuzzy Hash: 6A615C79244342AFE224DF14CC85F2BB7A8FB88B40F20891DFA5997295C771FD428B61
                                APIs
                                • GetModuleHandleA.KERNEL32(USER32,?,?,?,0067D2AE), ref: 0067D197
                                • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 0067D1AF
                                • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0067D1C0
                                • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 0067D1D1
                                • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 0067D1E2
                                • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 0067D1F3
                                • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0067D204
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: AddressProc$HandleModule
                                • String ID: EnumDisplayMonitors$GetMonitorInfoA$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                                • API String ID: 667068680-2376520503
                                • Opcode ID: d01309fa5d5a575f7f39e1bb2a05b19fde93f82e1a25986844c3a971ef9b82ec
                                • Instruction ID: 129a75ab767a628a095725c062761a841f20a0d2c653bac7baaec40ef93c0852
                                • Opcode Fuzzy Hash: d01309fa5d5a575f7f39e1bb2a05b19fde93f82e1a25986844c3a971ef9b82ec
                                • Instruction Fuzzy Hash: 30116071B682129EC7019F75ACC042BBBBBB749740360C83ED268D2251CF758542AFD0
                                APIs
                                • DeleteObject.GDI32(?), ref: 10018F91
                                • DeleteObject.GDI32(?), ref: 10018FA7
                                • DeleteObject.GDI32(?), ref: 10018FC1
                                • DeleteObject.GDI32(?), ref: 10018FCE
                                • CreateFontIndirectA.GDI32(00000000), ref: 1001900A
                                • CreateFontIndirectA.GDI32(00000000), ref: 1001902C
                                • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 10019057
                                • CreateFontIndirectA.GDI32(?), ref: 1001905E
                                • CreateFontIndirectA.GDI32 ref: 10019076
                                • SystemParametersInfoA.USER32 ref: 100190A3
                                • CreateFontIndirectA.GDI32(?), ref: 100190BA
                                • CreateFontIndirectA.GDI32(?), ref: 100190CD
                                • CreateFontIndirectA.GDI32(?), ref: 10019102
                                • CreateFontIndirectA.GDI32(?), ref: 10019116
                                • CreateFontIndirectA.GDI32(?), ref: 10019131
                                • CreateFontIndirectA.GDI32(?), ref: 10019145
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreateFontIndirect$DeleteObject$InfoParametersSystem
                                • String ID:
                                • API String ID: 3387422844-0
                                • Opcode ID: 830815c587014a26e3a7e992bde17b6236e9c72615f67e54c72626ec8243f3db
                                • Instruction ID: 711df5a203e8b563da40807aa8fc905527dfc6b6a225bd5e8f361db8bcb87da6
                                • Opcode Fuzzy Hash: 830815c587014a26e3a7e992bde17b6236e9c72615f67e54c72626ec8243f3db
                                • Instruction Fuzzy Hash: DD6116B06007468FE720CF69C880A9BF7E5FF88744F504A2EE98A87640E774FA45CB55
                                APIs
                                • IsWindowVisible.USER32(?), ref: 10015C7C
                                • GetClientRect.USER32(?,?), ref: 10015CA1
                                • GetWindowRect.USER32(?,?), ref: 10015CB0
                                • ClientToScreen.USER32(?,?), ref: 10015CC5
                                • ClientToScreen.USER32(?,?), ref: 10015CD0
                                • OffsetRect.USER32(?,?,?), ref: 10015CEB
                                • OffsetRect.USER32(?,?,?), ref: 10015D00
                                • EqualRect.USER32(?,?), ref: 10015D0C
                                • IsWindowEnabled.USER32(?), ref: 10015D96
                                • GetFocus.USER32 ref: 10015DF8
                                  • Part of subcall function 1000AF00: EqualRect.USER32(1000AEEB,?), ref: 1000AF0A
                                  • Part of subcall function 1000AF00: IsRectEmpty.USER32(?), ref: 1000AF21
                                  • Part of subcall function 1000AF00: CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF49
                                  • Part of subcall function 1000AF00: CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF61
                                  • Part of subcall function 1000AF00: CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000AF6A
                                  • Part of subcall function 1000AF00: SelectClipRgn.GDI32(?,00000000), ref: 1000AF72
                                  • Part of subcall function 1000AF00: DeleteObject.GDI32(00000000), ref: 1000AF7F
                                  • Part of subcall function 1000AF00: DeleteObject.GDI32(00000000), ref: 1000AF82
                                  • Part of subcall function 1000AF00: CreatePen.GDI32(00000000,00000001,?), ref: 1000AFA1
                                  • Part of subcall function 1000AF00: CreateSolidBrush.GDI32(?), ref: 1000B041
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,00000000), ref: 1000B051
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,00000000), ref: 1000B059
                                  • Part of subcall function 1000AF00: Rectangle.GDI32(?,?,?,?,?), ref: 1000B074
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,?), ref: 1000B080
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,?), ref: 1000B088
                                  • Part of subcall function 1000AF00: IsRectEmpty.USER32(?), ref: 1000B08F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Object$Select$Create$ClientWindow$DeleteEmptyEqualOffsetScreen$BrushClipCombineEnabledFocusRectangleSolidVisible
                                • String ID:
                                • API String ID: 2232225062-0
                                • Opcode ID: 6fd00cd0d9cef5d93f091ee120e2f42cff278c3d6447bc84d75fe32b91aeaa54
                                • Instruction ID: 8293882ae8f60722bbcd7dca41eebeae144ae381a56dea18b72fd41b6b61f364
                                • Opcode Fuzzy Hash: 6fd00cd0d9cef5d93f091ee120e2f42cff278c3d6447bc84d75fe32b91aeaa54
                                • Instruction Fuzzy Hash: 6291F4B96043019FD304DF69C88592BB7E9EBC8310F14CA1DF9998B355DA31E946CB92
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Empty$Window$Long
                                • String ID:
                                • API String ID: 1594619121-0
                                • Opcode ID: bb4e3b14c8995c92c39710eed11583c245718b1c2e8e577bdaf230dd83820362
                                • Instruction ID: d0c9926444baea1fe4ebff3a720e05cc6beccc75dc12de5c1cc4c6843b7c2cf1
                                • Opcode Fuzzy Hash: bb4e3b14c8995c92c39710eed11583c245718b1c2e8e577bdaf230dd83820362
                                • Instruction Fuzzy Hash: FFA11375605B058FE364CF28C888BA7B7E5FF88345F25896DD89E87215DB32A806CF50
                                APIs
                                • KillTimer.USER32(?,00006626), ref: 1002412C
                                • SendMessageA.USER32(?,0000001F,00000000,00000000), ref: 1002413C
                                  • Part of subcall function 10024CF0: GetMenuItemInfoA.USER32 ref: 10024D26
                                  • Part of subcall function 100124D0: SetTimer.USER32(?,?,00000000,10012490), ref: 100124E3
                                • KillTimer.USER32(?,?), ref: 10024176
                                • TrackPopupMenu.USER32(?,00000000,00000000,00000000,00000000,?), ref: 100241DA
                                  • Part of subcall function 10023F00: GetCursorPos.USER32(?), ref: 10023F0E
                                  • Part of subcall function 10023F00: GetWindowRect.USER32(?,?), ref: 10023F1D
                                  • Part of subcall function 10023F00: PtInRect.USER32(?,?,?), ref: 10023F38
                                  • Part of subcall function 10023F00: PtInRect.USER32(00000168,?,?), ref: 10023F67
                                  • Part of subcall function 10023F00: GetMenuItemCount.USER32(?), ref: 10023F94
                                  • Part of subcall function 10023F00: GetMenuItemInfoA.USER32 ref: 10023FE3
                                  • Part of subcall function 10023F00: OffsetRect.USER32(?,?,00000000), ref: 1002401B
                                  • Part of subcall function 10023F00: PtInRect.USER32(?,00000400,00000000), ref: 10024030
                                  • Part of subcall function 10024060: GetMenuItemRect.USER32(?,?,?,?), ref: 10024082
                                  • Part of subcall function 10024060: GetMenuItemRect.USER32(?,?,?,?), ref: 10024099
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Menu$Item$Timer$InfoKill$CountCursorMessageOffsetPopupSendTrackWindow
                                • String ID:
                                • API String ID: 2948288781-0
                                • Opcode ID: 51ee28288f19f70f4e95dd3a8ef5f6a57d4dcf2b95c017293d7a3d885d298ca3
                                • Instruction ID: 37a8328168521e0b11368bf9a4f74ca38fbc0c8ce550388fabf89b9119d921f0
                                • Opcode Fuzzy Hash: 51ee28288f19f70f4e95dd3a8ef5f6a57d4dcf2b95c017293d7a3d885d298ca3
                                • Instruction Fuzzy Hash: 0F71EF79200702ABE310DB28DC84FABB7F9EF98754F11891DF55A87290DB31E945CB51
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10002C9C
                                • SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 10002CBD
                                • SendMessageA.USER32(?,00000020,?,0202FFFE), ref: 10002CDD
                                • GetCursorPos.USER32(?), ref: 10002D06
                                • GetWindowRect.USER32(?,?), ref: 10002D1C
                                • GetWindowRect.USER32(?,?), ref: 10002D2A
                                • GetWindowRect.USER32(?,?), ref: 10002D38
                                • PtInRect.USER32(?,?,?), ref: 10002D87
                                • LoadCursorA.USER32(00000000,00007F85), ref: 10002DC6
                                • SetCursor.USER32(00000000), ref: 10002DCD
                                • SendMessageA.USER32(?,?,0000000F,?), ref: 10002DE9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: RectWindow$CursorMessageSend$EnabledLoad
                                • String ID:
                                • API String ID: 4229092383-0
                                • Opcode ID: f0ec41966ff8e8fd90f7b837bfef7e6c1f3a3dc11e14d87aa70b65b93e45b5b6
                                • Instruction ID: dc413347daec2f70c86c06c67fd336eb8edfad542e32f7a3e4721b36555a0e72
                                • Opcode Fuzzy Hash: f0ec41966ff8e8fd90f7b837bfef7e6c1f3a3dc11e14d87aa70b65b93e45b5b6
                                • Instruction Fuzzy Hash: 66517975608742AFE310DB65CC88E9BB7E9FFC8B50F60891DF58983250D674E905CB62
                                APIs
                                • DeleteDC.GDI32(?), ref: 10017387
                                • DeleteDC.GDI32(?), ref: 10017394
                                • DeleteObject.GDI32(?), ref: 100173A1
                                • ??3@YAXPAX@Z.MSVCRT(?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718,?,?,?), ref: 100173D4
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718,?,?,?), ref: 100173E0
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718,?,?,?), ref: 100173EC
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718,?,?,?), ref: 100173F8
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718,?,?,?), ref: 10017404
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718), ref: 10017410
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718), ref: 10017424
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF,10019718), ref: 10017430
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A,000000FF), ref: 1001743C
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000,1002781A), ref: 10017448
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00BD2830,00000000,00BD283C,00000000), ref: 10017454
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00BD2830,00000000,00BD283C), ref: 10017460
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$Delete$Object
                                • String ID:
                                • API String ID: 1805807598-0
                                • Opcode ID: 7dfc8e9b76ec8d4358b16a62e95c70112af35dfd5ff9e327eec210a0c710efcf
                                • Instruction ID: 8eb2a162a59bfd02bb3efb1085eef2ff5d2453cd59b241f8ea59b29271d371ff
                                • Opcode Fuzzy Hash: 7dfc8e9b76ec8d4358b16a62e95c70112af35dfd5ff9e327eec210a0c710efcf
                                • Instruction Fuzzy Hash: 0D3105B9500B519BC720DFB8D8C5A9BB7E8FB4C210FA08D1DB5AA87241C676F9449B60
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10016A9B
                                • SetRect.USER32(?,00000000,?,?,?), ref: 10016C24
                                • MulDiv.KERNEL32(?,?,?), ref: 10016C3D
                                • OffsetRect.USER32(?,00000000,00000000), ref: 10016C51
                                • OffsetRect.USER32(?,00000000,?), ref: 10016C7F
                                • IsRectEmpty.USER32(?), ref: 10016C85
                                • MulDiv.KERNEL32(?,76C22370,?), ref: 10016CDB
                                • MulDiv.KERNEL32(-00000001,?,?), ref: 10016CFA
                                • MulDiv.KERNEL32(?,?,?), ref: 10016D1F
                                • SetRect.USER32(?,?,00000000,?,?), ref: 10016DB7
                                • SetRectEmpty.USER32(?), ref: 10016DC3
                                • EqualRect.USER32(?,?), ref: 10016DED
                                • EqualRect.USER32(?,?), ref: 10016DFD
                                • SetRectEmpty.USER32(?), ref: 10016E30
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Empty$EqualOffset$EnabledWindow
                                • String ID:
                                • API String ID: 1250441839-0
                                • Opcode ID: 488337cf230d6d23f37ee5c869d15c7c6214d7048653378568f50572e3e0747a
                                • Instruction ID: b6d8e02c079bcafa56aa8081014225c04d9d0cf20a220bfdce263d8fab6bfb8f
                                • Opcode Fuzzy Hash: 488337cf230d6d23f37ee5c869d15c7c6214d7048653378568f50572e3e0747a
                                • Instruction Fuzzy Hash: 3302E4746047019FC718CF69C98491AFBF6FF88304F248A2DE98A8B755D731E985CB91
                                APIs
                                • __EH_prolog.LIBCMT ref: 006A3184
                                • lstrlenA.KERNEL32(?,00000000,00000000,0000004C), ref: 006A31B5
                                • VariantClear.OLEAUT32(?), ref: 006A3458
                                • VariantClear.OLEAUT32(?), ref: 006A347F
                                • SysFreeString.OLEAUT32(00000000), ref: 006A34E3
                                • SysFreeString.OLEAUT32(0000004C), ref: 006A34F8
                                • SysFreeString.OLEAUT32(?), ref: 006A350D
                                • VariantChangeType.OLEAUT32(?,?,00000000,80020004), ref: 006A3548
                                • VariantClear.OLEAUT32(?), ref: 006A3558
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Variant$ClearFreeString$ChangeH_prologTypelstrlen
                                • String ID:
                                • API String ID: 344392101-0
                                • Opcode ID: e18b0969c3f4faf47e2834b8430c4c2c74f152685def922f4c522012ce3ac46a
                                • Instruction ID: 2ef561572cde8e91d010b2cd62ed5e0b977e12e3273426c55b1ca52f971fde96
                                • Opcode Fuzzy Hash: e18b0969c3f4faf47e2834b8430c4c2c74f152685def922f4c522012ce3ac46a
                                • Instruction Fuzzy Hash: DAE1587190422ADFDF11EFA8D885AAEBBB6EF06310F144129F911AB350D774AE51CF60
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 10012DA6
                                • OffsetRect.USER32(?,?,?), ref: 10012DBF
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                • SelectObject.GDI32(?,?), ref: 10012DF5
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 10012E0F
                                • SendMessageA.USER32(?,00000408,00000000,00000000), ref: 10012E28
                                • SendMessageA.USER32(?,00000407,00000001,00000000), ref: 10012E3C
                                • IsWindowEnabled.USER32(?), ref: 10012E7B
                                • IsWindowEnabled.USER32(?), ref: 10012F5A
                                • IsWindowEnabled.USER32(?), ref: 10012F95
                                • IsWindowEnabled.USER32(?), ref: 1001306D
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 100130BE
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Enabled$ObjectRectSelect$ClipMessageSend$CreateDeleteOffset
                                • String ID: s
                                • API String ID: 1340192756-453955339
                                • Opcode ID: 6133fc0ec921e100b3f7b777ce710fdf6920ba7fd51a58843914a26640d38602
                                • Instruction ID: 4c5c30fd0665583f47b77be65c20ac278036d55bad62e296687f2ec44f63bcda
                                • Opcode Fuzzy Hash: 6133fc0ec921e100b3f7b777ce710fdf6920ba7fd51a58843914a26640d38602
                                • Instruction Fuzzy Hash: A9B148B9204301AFE348CF68C885E6AB7EAFBC8714F148A2DF95997351DB30E941CB51
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1000669B
                                • SelectObject.GDI32(?,?), ref: 100066CF
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 100066E7
                                • GetPropA.USER32(?,SHE), ref: 100066F3
                                • IsWindowEnabled.USER32(?), ref: 10006700
                                • GetFocus.USER32 ref: 10006745
                                • InflateRect.USER32(?,000000FB,000000FB), ref: 100067AA
                                • InflateRect.USER32(?,00000005,00000005), ref: 100067F1
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 10006813
                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 10006877
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Inflate$??3@ClientEnabledFocusObjectPropSelectWindow
                                • String ID: SHE$s
                                • API String ID: 24168671-2844048607
                                • Opcode ID: 56a6494f06aac4152130a0ded8c5564aef69c26dddad691a5dc4789beaeebca9
                                • Instruction ID: 808e24e67ffa3fdcadfbf8160937d97e86c192aaa0f854ceeccdbcc12e2f0151
                                • Opcode Fuzzy Hash: 56a6494f06aac4152130a0ded8c5564aef69c26dddad691a5dc4789beaeebca9
                                • Instruction Fuzzy Hash: 3A8159B96043419FE314CF54CC84E6BB3EAFB88794F218A2CF95987355DA30ED458B61
                                APIs
                                • SendMessageA.USER32(?,000000F6,00000001,00000000), ref: 10007570
                                • GetIconInfo.USER32(00000000,?), ref: 10007586
                                • GetObjectA.GDI32(?,00000018,?), ref: 10007598
                                • DrawIconEx.USER32(?,?,?,00000000,?,?,00000000,00000000,00000003), ref: 1000761E
                                • DeleteObject.GDI32(?), ref: 1000762F
                                • DeleteObject.GDI32(?), ref: 10007636
                                • SendMessageA.USER32(?,000000F6,00000000,00000000), ref: 1000764D
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 10007665
                                • SelectObject.GDI32(00000000,00000000), ref: 1000767A
                                • 73F84D40.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 10007701
                                • DeleteDC.GDI32(00000000), ref: 10007708
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Delete$IconMessageSend$DrawInfoSelect
                                • String ID: s
                                • API String ID: 2392992781-453955339
                                • Opcode ID: 122180a6be51cacf192691a891b99cc1150dfe11f8c774a4c476940fe2165945
                                • Instruction ID: 5ad2fc0d9cfef1da6667f6bfad95baaf5387ec86fbaa1d7a00321d89c8de7b88
                                • Opcode Fuzzy Hash: 122180a6be51cacf192691a891b99cc1150dfe11f8c774a4c476940fe2165945
                                • Instruction Fuzzy Hash: BD516075300611AFD344CA7CCD85F6BB7EAEFC8244F198628FA49C7255D671EC068790
                                APIs
                                • GetSysColor.USER32(0000000F), ref: 10011466
                                • GetSystemMetrics.USER32(0000000F), ref: 10011476
                                • GetSystemMetrics.USER32(00000000), ref: 1001147D
                                • GetSystemMetrics.USER32(00000001), ref: 10011484
                                • GetSystemMetrics.USER32(0000000B), ref: 1001148B
                                • GetSystemMetrics.USER32(0000000C), ref: 10011492
                                • GetSystemMetrics.USER32(00000002), ref: 10011499
                                • GetSystemMetrics.USER32(00000003), ref: 100114A0
                                • GetSystemMetrics.USER32(00000020), ref: 100114A7
                                • GetSystemMetrics.USER32(00000021), ref: 100114AE
                                • GetSystemMetrics.USER32(00000007), ref: 100114B5
                                • GetSystemMetrics.USER32(00000008), ref: 100114BC
                                • GetSystemMetrics.USER32(00000004), ref: 100114C3
                                • GetSystemMetrics.USER32(00000033), ref: 100114CA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MetricsSystem$Color
                                • String ID:
                                • API String ID: 3740768223-0
                                • Opcode ID: 4821abbd3c922a8ad17e9c27865194d4b68152617fa17cc4b81dc97e02bf1303
                                • Instruction ID: b415c9ff06fc4772aef4a92c67fdb6d16b11039c2eda6f13e71a1828a8f5e86c
                                • Opcode Fuzzy Hash: 4821abbd3c922a8ad17e9c27865194d4b68152617fa17cc4b81dc97e02bf1303
                                • Instruction Fuzzy Hash: F00187B0D417449AE7306FB29D4EF07BEE0EFC0B00F11492EE2858BA81D6B5A141CF40
                                APIs
                                • VariantClear.OLEAUT32(?), ref: 0063B628
                                • VariantClear.OLEAUT32(?), ref: 0063B62E
                                • VariantCopyInd.OLEAUT32(?,00000000), ref: 0063B72E
                                • VariantCopyInd.OLEAUT32(?,00000000), ref: 0063B7C3
                                • VariantClear.OLEAUT32(?), ref: 0063B814
                                • VariantClear.OLEAUT32(?), ref: 0063B81A
                                • VariantClear.OLEAUT32(?), ref: 0063B843
                                • VariantClear.OLEAUT32(?), ref: 0063B849
                                • VariantClear.OLEAUT32(?), ref: 0063B889
                                • VariantClear.OLEAUT32(?), ref: 0063B88F
                                • VariantClear.OLEAUT32(?), ref: 0063B8AC
                                • VariantClear.OLEAUT32(?), ref: 0063B8B2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Variant$Clear$Copy
                                • String ID:
                                • API String ID: 1429811287-0
                                • Opcode ID: a5448d8d053f8b978c1a218a2f5ffe5b98ef813420d81f71033a96ed32c29006
                                • Instruction ID: 58719d0aa31a377f7f2f9b611a392a35fd08803ff3731b1aacd54b2a1e1553dc
                                • Opcode Fuzzy Hash: a5448d8d053f8b978c1a218a2f5ffe5b98ef813420d81f71033a96ed32c29006
                                • Instruction Fuzzy Hash: 04B14C70A002069FDB18CF58D890EAAB3BAFF88310B14C95DEA5ACB355D735ED51CB90
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1001CA4C
                                • GetWindowRect.USER32(?,?), ref: 1001CA5B
                                • ClientToScreen.USER32(?,?), ref: 1001CA70
                                • ClientToScreen.USER32(?,?), ref: 1001CA7B
                                • OffsetRect.USER32(?,?,?), ref: 1001CA96
                                • OffsetRect.USER32(?,?,?), ref: 1001CAAB
                                • EqualRect.USER32(?,?), ref: 1001CAB7
                                • BeginPath.GDI32(00000000), ref: 1001CAC2
                                • Rectangle.GDI32(00000000,?,?,?,?), ref: 1001CADD
                                • EndPath.GDI32(00000000), ref: 1001CAE4
                                • SelectClipPath.GDI32(00000000,00000004), ref: 1001CAED
                                • SelectObject.GDI32(00000000,?), ref: 1001CB00
                                • PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1001CB1A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$ClientPath$OffsetScreenSelect$BeginClipEqualObjectRectangleWindow
                                • String ID:
                                • API String ID: 2221267872-0
                                • Opcode ID: 219697da08de77e07886dc8c6d20df574dcbbf54c4940b152de1776a259c56e3
                                • Instruction ID: 2ba2e5f7c95da289b8c11f671d4d77d81127840f5cb8de534027a22f72d25923
                                • Opcode Fuzzy Hash: 219697da08de77e07886dc8c6d20df574dcbbf54c4940b152de1776a259c56e3
                                • Instruction Fuzzy Hash: B231C879204316AFE714DB65CCC9D7BB3F9FBC8614F108A0CF55683250DA74E94A8B61
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 100084C9
                                • GetComboBoxInfo.USER32 ref: 100084DC
                                • GetWindowRect.USER32(?,?), ref: 100084FD
                                • OffsetRect.USER32(?,?,?), ref: 1000851B
                                • CallWindowProcA.USER32(?,?,0000000F,?,?), ref: 10008566
                                • IsWindowEnabled.USER32(?), ref: 10008599
                                • GetFocus.USER32 ref: 100085A7
                                • IsRectEmpty.USER32(?), ref: 10008606
                                • SelectObject.GDI32(00000000,?), ref: 10008646
                                • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 1000866A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: RectWindow$CallComboEmptyEnabledFocusInfoObjectOffsetProcSelect
                                • String ID: 4
                                • API String ID: 3620934650-4088798008
                                • Opcode ID: ff69685712dfb7541cd1ad91b48a2aaedd911cbe40dfa843f3ff19d120081c87
                                • Instruction ID: 5cea887d1a42687cc65618457859d6ae2faca28e616dd28a7858be6a4daf13f9
                                • Opcode Fuzzy Hash: ff69685712dfb7541cd1ad91b48a2aaedd911cbe40dfa843f3ff19d120081c87
                                • Instruction Fuzzy Hash: 275127B9208701AFE314DF68C880E6BB7E9FBC8750F108A1DF99987355DA30E945CB52
                                APIs
                                • _mbscmp.MSVCRT ref: 1001A9D3
                                • _mbscmp.MSVCRT ref: 1001A9FD
                                • GetParent.USER32(?), ref: 1001AA0B
                                • FindWindowExA.USER32(00000000,00000000,DiDaSG,00000000), ref: 1001AA23
                                • FindWindowExA.USER32(00000000,00000000,DiDaGrid,00000000), ref: 1001AA31
                                • FindWindowExA.USER32(00000000,00000000,DiDaViewCtrl,00000000), ref: 1001AA3F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: FindWindow$_mbscmp$Parent
                                • String ID: DiDaGrid$DiDaSG$DiDaViewCtrl$Edit$ScrollBar
                                • API String ID: 3521712903-213082921
                                • Opcode ID: 5e0b855fcac5159f367e03da2c711da51616acd7177871d874b9811b27d61f41
                                • Instruction ID: 07a90f14033cc30d1d35d2e0eeef8570c81e30e2f87793286d4a341ae43e1c20
                                • Opcode Fuzzy Hash: 5e0b855fcac5159f367e03da2c711da51616acd7177871d874b9811b27d61f41
                                • Instruction Fuzzy Hash: D111C8773516252BE200F6A8AC90FAB63CCDFD5666F514022FB00EA140D334ED8687B5
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1000C702
                                • GetWindowRect.USER32(?,?), ref: 1000C711
                                • ClientToScreen.USER32(?,?), ref: 1000C726
                                • ClientToScreen.USER32(?,?), ref: 1000C731
                                • OffsetRect.USER32(?,?,?), ref: 1000C74C
                                • OffsetRect.USER32(?,?,?), ref: 1000C761
                                • IsWindowEnabled.USER32(?), ref: 1000C778
                                • GetFocus.USER32 ref: 1000C782
                                • InflateRect.USER32(00000020,000000FE,000000FE), ref: 1000C81C
                                • SelectObject.GDI32(00000000,?), ref: 1000C830
                                • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 1000C84F
                                • IsWindowEnabled.USER32(?), ref: 1000C859
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$ClientWindow$EnabledOffsetScreen$FocusInflateObjectSelect
                                • String ID:
                                • API String ID: 3408369734-0
                                • Opcode ID: 3be52d9941539292c299830c6e9bf5df74aa8ccb6bf1b58d779688aaf5952ba0
                                • Instruction ID: d3539a25c7ff0506e7ee7ab9e9479a1055ac5ff067c866c20199165bfa3bfce7
                                • Opcode Fuzzy Hash: 3be52d9941539292c299830c6e9bf5df74aa8ccb6bf1b58d779688aaf5952ba0
                                • Instruction Fuzzy Hash: C25119B8204706AFE314DF69C884D2BB7E9FFC8354B208A1DF85987365D631ED468B61
                                APIs
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 1001608F
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 100160C2
                                • GetParent.USER32(?), ref: 1001611B
                                • SendMessageA.USER32(00000000), ref: 10016122
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow$MessageParentSend
                                • String ID:
                                • API String ID: 482362837-0
                                • Opcode ID: 916f991154467816be997b105c9d4eb4c11a9125e158527fd240b7089936db19
                                • Instruction ID: 0d51841f0734fbb8e4940dc07b8de3669c789b49538fb586d0ae161ad6d6c563
                                • Opcode Fuzzy Hash: 916f991154467816be997b105c9d4eb4c11a9125e158527fd240b7089936db19
                                • Instruction Fuzzy Hash: 4E519E76200611AFE310DB68CC85FAB73E8EB8C750F144918F95ACB292D670E985CBA1
                                APIs
                                • GetWindowRect.USER32(?), ref: 1000C03F
                                • GetClientRect.USER32(?,?), ref: 1000C04B
                                • ClientToScreen.USER32(?,?), ref: 1000C05D
                                • ClientToScreen.USER32(?,?), ref: 1000C065
                                • OffsetRect.USER32(?,?,?), ref: 1000C080
                                • OffsetRect.USER32(?,?,?), ref: 1000C095
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C0B1
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C0C9
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000C0D2
                                • SelectClipRgn.GDI32(?,00000000), ref: 1000C0DE
                                • DeleteObject.GDI32(00000000), ref: 1000C0EB
                                • DeleteObject.GDI32(00000000), ref: 1000C0EE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Client$CreateDeleteObjectOffsetScreen$ClipCombineSelectWindow
                                • String ID:
                                • API String ID: 2240990249-0
                                • Opcode ID: 4b3a124ec8f7523d0d551fb504430074e69b4b5c7f317864df0b48e49119c4e9
                                • Instruction ID: 6da254da4a0019f5656eed989aa654683ae0a7bab9e4da9d351570924b964c57
                                • Opcode Fuzzy Hash: 4b3a124ec8f7523d0d551fb504430074e69b4b5c7f317864df0b48e49119c4e9
                                • Instruction Fuzzy Hash: C021D8B9115225BFE304DB55CC84CABB7EDEFC9710F158A0DF98593210D674EA0A8BA2
                                APIs
                                • CompareStringW.KERNEL32(00000000,00000000,0087FA3C,00000001,0087FA3C,00000001,00000000,027211AC,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,00682862), ref: 00690330
                                • CompareStringA.KERNEL32(00000000,00000000,0087FA38,00000001,0087FA38,00000001), ref: 0069034D
                                • CompareStringA.KERNEL32(00624130,006241D0,00624280,00000000,b(h,00000000,00000000,027211AC,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,00682862), ref: 006903AB
                                • GetCPInfo.KERNEL32(00000000,00000000,00000000,027211AC,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,00682862,00000000), ref: 006903FC
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000), ref: 0069047B
                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,?,?), ref: 006904DC
                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,?,00000000,00000000), ref: 006904EF
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0069053B
                                • CompareStringW.KERNEL32(00623EF6,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00690553
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ByteCharCompareMultiStringWide$Info
                                • String ID: b(h
                                • API String ID: 1651298574-2854650268
                                • Opcode ID: 5c0e6266643f555dc37cd1e75106d56ceb446345be79ce9ef079dd057871ce94
                                • Instruction ID: dd9611b21c42eb4b76ce4865cadc7a6560537f93cdb66e3775e4d525e5b97130
                                • Opcode Fuzzy Hash: 5c0e6266643f555dc37cd1e75106d56ceb446345be79ce9ef079dd057871ce94
                                • Instruction Fuzzy Hash: 2A71AB7290024AEFEF219F548D859EE7BBFFB09704F11412AF951A2661D3328D51DFA0
                                APIs
                                • SelectObject.GDI32(?,?), ref: 10012809
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 1001281F
                                • SetMapMode.GDI32(?,00000001), ref: 1001282B
                                • SetWindowOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1001283B
                                • SetWindowExtEx.GDI32(?,00000001,00000001,00000000), ref: 1001284B
                                • SetViewportOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1001285B
                                • SetViewportExtEx.GDI32(?,00000001,00000001,00000000), ref: 1001286B
                                • 73F84D40.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 100128B8
                                  • Part of subcall function 1000FC70: SelectObject.GDI32(?,?), ref: 1000FC7A
                                  • Part of subcall function 1000FC70: DeleteDC.GDI32 ref: 1000FC83
                                  • Part of subcall function 1000FC70: DeleteObject.GDI32(?), ref: 1000FC8D
                                  • Part of subcall function 1000E340: SelectObject.GDI32(?,?), ref: 1000E3AA
                                  • Part of subcall function 1000E340: DeleteDC.GDI32(?), ref: 1000E3B4
                                  • Part of subcall function 1000E340: DeleteObject.GDI32(?), ref: 1000E3D1
                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 1001292B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Delete$Select$ViewportWindow$??3@Mode
                                • String ID: s
                                • API String ID: 2611903862-453955339
                                • Opcode ID: 2c7208d9f9cc6fae1fbc982cd13d60a7d2cd2e901e4ab997d711d0d3189936f4
                                • Instruction ID: 5a2126a295ea02ada3bf3e3be973f49605dcc2c156f47a887c0508dc2def5236
                                • Opcode Fuzzy Hash: 2c7208d9f9cc6fae1fbc982cd13d60a7d2cd2e901e4ab997d711d0d3189936f4
                                • Instruction Fuzzy Hash: FA614BB9640301AFE724CF18CC85F5B77A9FB88B50F20891CF9599B391C671E881CBA5
                                APIs
                                • __EH_prolog.LIBCMT ref: 00696064
                                • GetSystemMetrics.USER32(0000002A), ref: 00696115
                                • GlobalLock.KERNEL32(00000000), ref: 0069619F
                                • CreateDialogIndirectParamA.USER32(?,FFFFFFB2,?,00695EA7,00000000), ref: 006961D1
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreateDialogGlobalH_prologIndirectLockMetricsParamSystem
                                • String ID: Helv$MS Sans Serif$MS Shell Dlg
                                • API String ID: 2364537584-2894235370
                                • Opcode ID: 897c0adc9d3ac681d4ccfe0feedc56f3ad4b8be52cd44cbb38c191b2e127cbba
                                • Instruction ID: 8069f3ef6fd83b2afe12f2f2e8a58fa7cee0eb94e1e521f12d89f9e8fda503ef
                                • Opcode Fuzzy Hash: 897c0adc9d3ac681d4ccfe0feedc56f3ad4b8be52cd44cbb38c191b2e127cbba
                                • Instruction Fuzzy Hash: 2C617A7190030AEFCF14EFA8D9859EEBBBAFF14304F24402EF506A2691DB359A44CB55
                                APIs
                                • #45.ODBC32 ref: 0067E14E
                                • #45.ODBC32(?,00000050,?,00000004,?), ref: 0067E185
                                • #45.ODBC32(?,0000002E,?,00000002,?), ref: 0067E1B5
                                • #45.ODBC32(?,00000017,?,00000002,?), ref: 0067E1E3
                                • #45.ODBC32(?,00000018,?,00000002,?), ref: 0067E206
                                • #45.ODBC32(?,00000052,?,00000004,?), ref: 0067E22A
                                • #45.ODBC32(?,00000051,?,00000004,?), ref: 0067E246
                                • #45.ODBC32(?,00000019,?,0000000A,?), ref: 0067E27A
                                • lstrcmpA.KERNEL32(?,0087EDB4), ref: 0067E29B
                                • #50.ODBC32(?,00000065,00000001), ref: 0067E2B9
                                • #45.ODBC32(?,0000001D,?,00000002,?,?,00000065,00000001), ref: 0067E2CC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: lstrcmp
                                • String ID:
                                • API String ID: 1534048567-0
                                • Opcode ID: ba11b6ed57c480dbfbca8db65cb9cafc69c1171ccff2d6492b7698edc1827bff
                                • Instruction ID: 13585e91537854cccdfa895dc737c36a24caf1dc77576364f2328888c8ff658c
                                • Opcode Fuzzy Hash: ba11b6ed57c480dbfbca8db65cb9cafc69c1171ccff2d6492b7698edc1827bff
                                • Instruction Fuzzy Hash: 79619171600609BFEB21CBA0CC4AFEBB7FEAF08704F108499E546D6681E775DA49CB54
                                APIs
                                • DeleteObject.GDI32(?), ref: 1001BC14
                                • DeleteObject.GDI32(?), ref: 1001BC2F
                                • DeleteObject.GDI32(?), ref: 1001BC5B
                                • DeleteObject.GDI32(?), ref: 1001BC7F
                                • DeleteObject.GDI32(?), ref: 1001BCA2
                                • DeleteObject.GDI32(?), ref: 1001BCBB
                                • SendMessageA.USER32(?,00006A31,00000000,00000000), ref: 1001BD28
                                • IsWindowVisible.USER32(?), ref: 1001BD38
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: DeleteObject$MessageSendVisibleWindow
                                • String ID:
                                • API String ID: 2663172341-0
                                • Opcode ID: 9eaa5807c86f827a565e6f2b3feca2c72fbca985b45077f70f87822426f3090f
                                • Instruction ID: 69cb3e28c512f8bc434b60400197b4956680df1e75d225c41875b39bfed14100
                                • Opcode Fuzzy Hash: 9eaa5807c86f827a565e6f2b3feca2c72fbca985b45077f70f87822426f3090f
                                • Instruction Fuzzy Hash: C15149B96006198FD744DF65D8C4D19BBE6EF84754B66806DE4098F261CB32ECC2CF54
                                APIs
                                • IsWindowVisible.USER32(?), ref: 1002356E
                                • SetTextColor.GDI32(?,?), ref: 1002374A
                                  • Part of subcall function 10023070: IsWindowVisible.USER32(?), ref: 10023094
                                  • Part of subcall function 10023070: IsRectEmpty.USER32(?), ref: 10023107
                                  • Part of subcall function 10023070: IsIconic.USER32(?), ref: 10023115
                                  • Part of subcall function 10023070: IsRectEmpty.USER32(?), ref: 100231E6
                                  • Part of subcall function 10023070: IsZoomed.USER32(?), ref: 100231F4
                                  • Part of subcall function 10023070: GetSystemMenu.USER32(?,00000000,0000F060,00000000), ref: 10023317
                                  • Part of subcall function 10023070: GetMenuState.USER32(00000000), ref: 1002331E
                                • GetWindowTextA.USER32(?,?,00000400), ref: 100237DD
                                • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 1002381F
                                • SetBkMode.GDI32(?,00000001), ref: 100238A2
                                • SelectObject.GDI32(?,00000000), ref: 100238B7
                                • DrawTextA.USER32(?,?,?,?,00040024), ref: 100238DE
                                • 73F84D40.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 1002390B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: TextWindow$DrawEmptyMenuRectVisible$ColorIconIconicModeObjectSelectStateSystemZoomed
                                • String ID: s
                                • API String ID: 3608014746-453955339
                                • Opcode ID: f2973cb4028198a9a51bb3a7a6b7762885dc349face6f824e9808d953d14431b
                                • Instruction ID: 3263a162000869abdaed50fa1a63b18b52f79a3c691ea1695c1955725f713e6b
                                • Opcode Fuzzy Hash: f2973cb4028198a9a51bb3a7a6b7762885dc349face6f824e9808d953d14431b
                                • Instruction Fuzzy Hash: 20C108B9240705AFE354CB64CC85FA7B3E9EB88740F208A1DF55A87255DA75FC068BA0
                                APIs
                                • GetMenuItemCount.USER32(?), ref: 1000FF8B
                                • GetMenuItemInfoA.USER32 ref: 1000FFCB
                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 10010083
                                • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 1001008D
                                • ??2@YAPAXI@Z.MSVCRT(0000000C,00000014), ref: 100100B2
                                • SetMenuItemInfoA.USER32 ref: 10010127
                                • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 10010174
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??2@ItemMenu$Info$??3@Count
                                • String ID: 0
                                • API String ID: 1280313425-4108050209
                                • Opcode ID: cc8c67f2bd9abdc1bcf278f41cf6078ea078a8eb8a740d13d7db29cf79bdf8f8
                                • Instruction ID: 9c73eb5ddcbb23b1021a2a30c8f8144f940f888cd30e2e31c2a3417c855ec077
                                • Opcode Fuzzy Hash: cc8c67f2bd9abdc1bcf278f41cf6078ea078a8eb8a740d13d7db29cf79bdf8f8
                                • Instruction Fuzzy Hash: 117128B1B042429FD304CF14C880A5ABBE5FF88754F25C56DF8899B361D7B6E886CB91
                                APIs
                                • GetCursorPos.USER32(?), ref: 10023F0E
                                • GetWindowRect.USER32(?,?), ref: 10023F1D
                                • PtInRect.USER32(?,?,?), ref: 10023F38
                                • PtInRect.USER32(00000168,?,?), ref: 10023F67
                                • GetMenuItemCount.USER32(?), ref: 10023F94
                                  • Part of subcall function 10024DB0: GetMenuItemRect.USER32(?,00000000,?,?,?,?,75756D90,00000000,10023B9B,00000000,?), ref: 10024DCB
                                  • Part of subcall function 10024DB0: OffsetRect.USER32(?,?,?), ref: 10024DF9
                                • GetMenuItemInfoA.USER32 ref: 10023FE3
                                • OffsetRect.USER32(?,?,00000000), ref: 1002401B
                                • PtInRect.USER32(?,00000400,00000000), ref: 10024030
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$ItemMenu$Offset$CountCursorInfoWindow
                                • String ID: 0
                                • API String ID: 1145675194-4108050209
                                • Opcode ID: 175602bbc668ff8853d7943d656a5cc7ce6d6184f3f0c48b566ecbe4b546db37
                                • Instruction ID: 31d5a28eec6a1afefc3e1dee2d447974a65d6f43cb3d9e79273529089ad59d0b
                                • Opcode Fuzzy Hash: 175602bbc668ff8853d7943d656a5cc7ce6d6184f3f0c48b566ecbe4b546db37
                                • Instruction Fuzzy Hash: BE415B752087019FD304DF68DC88A6BB7F9FBC8650F11891DFA5583250DB71E94ACBA2
                                APIs
                                  • Part of subcall function 100069F0: DeleteObject.GDI32(?), ref: 100069FE
                                • SelectObject.GDI32(00000000,?), ref: 10006A8A
                                • GetObjectA.GDI32(?,00000018,?), ref: 10006AA2
                                • SelectObject.GDI32(00000000,000000FF), ref: 10006AD1
                                • 73F84D40.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 10006AEE
                                • SelectObject.GDI32(00000000,00000000), ref: 10006AF6
                                • SelectObject.GDI32(00000000,00000000), ref: 10006AFE
                                • DeleteDC.GDI32(00000000), ref: 10006B07
                                • DeleteDC.GDI32(00000000), ref: 10006B0A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$Delete
                                • String ID: s
                                • API String ID: 4028988585-453955339
                                • Opcode ID: 9590772b2381df981e00ce1ca602ee8b7f492eed31d7fb91fb646ce7ea8e8a2e
                                • Instruction ID: 18bf3757976541dfd00de2af7b288375a6f254a0424e89b954cf1b644370f741
                                • Opcode Fuzzy Hash: 9590772b2381df981e00ce1ca602ee8b7f492eed31d7fb91fb646ce7ea8e8a2e
                                • Instruction Fuzzy Hash: A221A0762043196BF250EB59CCC0F2BB7EDEBC9790F60442DFA4097244DA64EC068BA2
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 005C01AB
                                • VariantInit.OLEAUT32(00000000), ref: 005C01DA
                                • VariantCopyInd.OLEAUT32(00000000), ref: 005C01E2
                                • SafeArrayGetElement.OLEAUT32(?,?,?), ref: 005C0285
                                  • Part of subcall function 005E7D20: RtlAllocateHeap.NTDLL(00BF0000,00000000,00000008,?,?,005C0141,00000008,?), ref: 005E7D31
                                • VariantCopyInd.OLEAUT32(?), ref: 005C0465
                                • VariantChangeType.OLEAUT32(00000000,?,00000000,?), ref: 005C0480
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Variant$CopyInit$AllocateArrayChangeElementHeapSafeType
                                • String ID:
                                • API String ID: 2026756349-0
                                • Opcode ID: c22d80ca2c7c2f4310e5297dfb7347758e71b3a9863db011d946845882f9f18c
                                • Instruction ID: a6569ae457fa3fba65bfbf70b49f45d83d197d2b03c3cf3f78df96e546bfc027
                                • Opcode Fuzzy Hash: c22d80ca2c7c2f4310e5297dfb7347758e71b3a9863db011d946845882f9f18c
                                • Instruction Fuzzy Hash: ECD14374509382CFC714DF94C884B6ABBE5FF89714F10992DE889873A0E735E945CB92
                                APIs
                                • ??2@YAPAXI@Z.MSVCRT ref: 100170FF
                                • ??2@YAPAXI@Z.MSVCRT(00000100), ref: 1001710F
                                • ??2@YAPAXI@Z.MSVCRT(00000078,00000100), ref: 1001711C
                                • ??2@YAPAXI@Z.MSVCRT(00000010,00000078,00000100), ref: 10017129
                                • ??2@YAPAXI@Z.MSVCRT(000054F0,00000010,00000078,00000100), ref: 10017139
                                • ??2@YAPAXI@Z.MSVCRT(000003DC,000054F0,00000010,00000078,00000100), ref: 10017149
                                • ??2@YAPAXI@Z.MSVCRT ref: 100171FB
                                • ??2@YAPAXI@Z.MSVCRT(00000100), ref: 1001720B
                                • ??2@YAPAXI@Z.MSVCRT(00000078,00000100), ref: 10017218
                                • ??2@YAPAXI@Z.MSVCRT(00000010,00000078,00000100), ref: 10017225
                                • ??2@YAPAXI@Z.MSVCRT(000054F0,00000010,00000078,00000100), ref: 10017235
                                • ??2@YAPAXI@Z.MSVCRT(000003DC,000054F0,00000010,00000078,00000100), ref: 10017245
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??2@
                                • String ID:
                                • API String ID: 1033339047-0
                                • Opcode ID: 410dd1f96e3f1d1cea1fdd0126b62a2689596ec5cbd5351870bc8534d49ce999
                                • Instruction ID: 0f10bd593ae600cb38cbaaa22fec1f499e913940d81218a79a1784d92bf44df9
                                • Opcode Fuzzy Hash: 410dd1f96e3f1d1cea1fdd0126b62a2689596ec5cbd5351870bc8534d49ce999
                                • Instruction Fuzzy Hash: FF7118B45007889BEB30CF29C8A17DABBE1FF4C310F90442E9A4D9B791DB7666558B81
                                APIs
                                • GlobalAlloc.KERNEL32(00000002,00000660,75756BA0,00000000,00000000,?,?,?,10003905,?,00000000,?,1002CDA8,?,1002CDC8), ref: 1001C227
                                • GlobalLock.KERNEL32(00000000), ref: 1001C230
                                • SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
                                • GlobalUnlock.KERNEL32(00000000), ref: 1001C2EB
                                • GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
                                • GlobalLock.KERNEL32(00000000), ref: 1001C316
                                • SetRect.USER32(?,?,?,?,?), ref: 1001C339
                                • ExtCreateRegion.GDI32(00000000,00000062,00000000), ref: 1001C3B3
                                • GlobalUnlock.KERNEL32(00000000), ref: 1001C3BC
                                • GlobalFree.KERNEL32(00000000), ref: 1001C3C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$AllocLockRectUnlock$CreateFreeRegion
                                • String ID:
                                • API String ID: 2388356299-0
                                • Opcode ID: 6ba06d16079189b5735e3eb41b3e1a1aff45cf1b4ebc31a8399078287940a643
                                • Instruction ID: 800a03afdf74d798d33c9bbd273a6215fc8d6eee2ba7c904765c8bbc0eaa987e
                                • Opcode Fuzzy Hash: 6ba06d16079189b5735e3eb41b3e1a1aff45cf1b4ebc31a8399078287940a643
                                • Instruction Fuzzy Hash: 165179752047058FD314CF19C8C4E1ABBE6FBC8354F158A2DF8969B252D730E98ACBA1
                                APIs
                                • GetUpdateRect.USER32(?,?,00000000), ref: 1000C110
                                • GetWindowRect.USER32(?,?), ref: 1000C126
                                • ClientToScreen.USER32(?,?), ref: 1000C138
                                • ClientToScreen.USER32(?,?), ref: 1000C140
                                • OffsetRect.USER32(?,?,?), ref: 1000C155
                                • CreateRectRgn.GDI32(?,?,?,?), ref: 1000C16F
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000001), ref: 1000C195
                                • DeleteObject.GDI32(00000000), ref: 1000C19C
                                • SelectClipRgn.GDI32(?,00000000), ref: 1000C1A4
                                • DeleteObject.GDI32(00000000), ref: 1000C1AB
                                  • Part of subcall function 1000C1C0: GetWindowRect.USER32(?,?), ref: 1000C1D7
                                  • Part of subcall function 1000C1C0: CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 1000C1F5
                                  • Part of subcall function 1000C1C0: FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C204
                                  • Part of subcall function 1000C1C0: IsWindowVisible.USER32(00000000), ref: 1000C211
                                  • Part of subcall function 1000C1C0: GetWindowRect.USER32(00000000,?), ref: 1000C22D
                                  • Part of subcall function 1000C1C0: OffsetRect.USER32(?,?,?), ref: 1000C242
                                  • Part of subcall function 1000C1C0: CreateRectRgn.GDI32(?,?,?,?), ref: 1000C25C
                                  • Part of subcall function 1000C1C0: CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000C269
                                  • Part of subcall function 1000C1C0: DeleteObject.GDI32(00000000), ref: 1000C270
                                  • Part of subcall function 1000C1C0: FindWindowExA.USER32(?,00000000,00000000,00000000), ref: 1000C280
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window$CreateDeleteObject$ClientCombineFindOffsetScreen$ClipSelectUpdateVisible
                                • String ID:
                                • API String ID: 3337848875-0
                                • Opcode ID: ab81bbd6e475fd5f65db4c67aaa5c7c4afadf060e7e249b2e30564a5a9679415
                                • Instruction ID: 74d7dfbfc758c62a16206c90bb991d6bb96e2836b961c83879c6e1e08fceeccd
                                • Opcode Fuzzy Hash: ab81bbd6e475fd5f65db4c67aaa5c7c4afadf060e7e249b2e30564a5a9679415
                                • Instruction Fuzzy Hash: 4611477A105221AFF300DB65CCC4DABB7ACEFC9740F14490DF94582200E734EA0A8BB2
                                APIs
                                • #17.ODBC32(00000012,?,00000013,?, WHERE CURRENT OF ,?,DELETE FROM ), ref: 0068054C
                                • #19.ODBC32(?,00000000,000000FD,000000FF,00000000,00000000,?, WHERE CURRENT OF ,?,DELETE FROM ), ref: 006805B1
                                  • Part of subcall function 00695593: lstrlenA.KERNEL32(?,005DF680,?,005DF6FB,?), ref: 006955A4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: lstrlen
                                • String ID: SET $ VALUES ($ WHERE CURRENT OF $DELETE FROM $INSERT INTO $UPDATE
                                • API String ID: 1659193697-2930128812
                                • Opcode ID: 37acb3997bf981464d4e33f933918fdaba8ff65eb3109a94853adbbf9a89c15b
                                • Instruction ID: e641faeee4bc492aed8caf570aee0304f2f4deb3aee004d13c62be14de23bd4f
                                • Opcode Fuzzy Hash: 37acb3997bf981464d4e33f933918fdaba8ff65eb3109a94853adbbf9a89c15b
                                • Instruction Fuzzy Hash: FD51B130300704ABEE65AA64C855FBEB7AFEF88700F404D1DF45B9B292DB74AC048B64
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop
                                • String ID: SHE
                                • API String ID: 257714900-2947365353
                                • Opcode ID: 2c6010a68df39a012fe3cfaaf114c4777e7ed861bf3d100bc81ecca3e0610d64
                                • Instruction ID: 2e390604217a2b3f58ee7591da4aaa58580bf2b8c483784fb10c7b559247f76a
                                • Opcode Fuzzy Hash: 2c6010a68df39a012fe3cfaaf114c4777e7ed861bf3d100bc81ecca3e0610d64
                                • Instruction Fuzzy Hash: 6741BF72600705DFE720DF59D8C0FABB7D9EB853A1F41852EF14A86102C731A8C5CB25
                                APIs
                                • DeleteObject.GDI32(?), ref: 10018E2A
                                • DeleteObject.GDI32(?), ref: 10018E3E
                                • SelectObject.GDI32(?,?), ref: 10018E89
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 10018EC1
                                • SelectObject.GDI32(?,?), ref: 10018ECF
                                • CreateSolidBrush.GDI32(?), ref: 10018F16
                                • CreatePatternBrush.GDI32(?), ref: 10018F23
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$BrushCreateDeleteSelect$PatternSolid
                                • String ID: s
                                • API String ID: 22681066-453955339
                                • Opcode ID: 493c7b64c06f7fda6f307e4e9a9fb4371a82727674913205bff5ba11ea4a1bec
                                • Instruction ID: 23f9e4fe7887b74c245d57b0e501ed812031919aed004f8028d95dad6bed7b15
                                • Opcode Fuzzy Hash: 493c7b64c06f7fda6f307e4e9a9fb4371a82727674913205bff5ba11ea4a1bec
                                • Instruction Fuzzy Hash: E03148B52007019FE214DF64C895FA7B7E9EB88750F11892DF69A872A1DB30F945CB60
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Color$CallProcPropTextWindow
                                • String ID: SHE
                                • API String ID: 1567449379-2947365353
                                • Opcode ID: fd243b49dd2b70934088a78486ed71f3f6b1e30930e2a5d8f73f0faa35da5f50
                                • Instruction ID: 4c3276a66a0a9f635cfbb79f7bd4f3ded52351a7d3631d5cad51002f68e975b9
                                • Opcode Fuzzy Hash: fd243b49dd2b70934088a78486ed71f3f6b1e30930e2a5d8f73f0faa35da5f50
                                • Instruction Fuzzy Hash: 32213C7A200215DFE214CF55DCC8EA7B7A9FF88711F258579FA0987612C731AC86CB60
                                APIs
                                • GetStockObject.GDI32(00000011), ref: 0069B3A5
                                • GetStockObject.GDI32(0000000D), ref: 0069B3AD
                                • GetObjectA.GDI32(00000000,0000003C,?), ref: 0069B3BA
                                • GetDC.USER32(00000000), ref: 0069B3C9
                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0069B3E0
                                • MulDiv.KERNEL32(?,00000048,00000000), ref: 0069B3EC
                                • ReleaseDC.USER32(00000000,00000000), ref: 0069B3F7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Stock$CapsDeviceRelease
                                • String ID: System
                                • API String ID: 46613423-3470857405
                                • Opcode ID: 4715cfa00b7778b07bb3170876234c21c8a5a33a8063199f8de7cf325c60b32e
                                • Instruction ID: b4bfe99713a1d882ea69c467723e22ed7429d683e1cd9431b57c588431e0bf27
                                • Opcode Fuzzy Hash: 4715cfa00b7778b07bb3170876234c21c8a5a33a8063199f8de7cf325c60b32e
                                • Instruction Fuzzy Hash: 26118271A00218ABEF00AFA1ED49FAE3BBEEB15740F005015F605E71D0D7B1AD01CBA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window
                                • String ID: SHE_A$SHE_C
                                • API String ID: 2353593579-3829401601
                                • Opcode ID: f539908fe5b4ee91853859bd00b7215825581461b09397d3a58328f8b06297f0
                                • Instruction ID: 61a02fd3fe343e1cbdaa3c21f8ae578eda2fb75fcd6781e2b5076b330a8b8943
                                • Opcode Fuzzy Hash: f539908fe5b4ee91853859bd00b7215825581461b09397d3a58328f8b06297f0
                                • Instruction Fuzzy Hash: EEF03035346A31B7FA91ABA4BC8AFDB3658DF05741F214010F701AA0D4D7A4AB8747EA
                                APIs
                                • GetModuleHandleA.KERNEL32(COMCTL32.DLL,00000800,00000000,00000400,00699502,00000000,00020000,?,?,00000000), ref: 00699211
                                • LoadLibraryA.KERNEL32(COMCTL32.DLL,?,00000000,?,?,?,?,?,?,?,?,006960A7,00000010,00000000), ref: 0069921A
                                • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 0069922E
                                • #17.COMCTL32(?,00000000,?,?,?,?,?,?,?,?,006960A7,00000010,00000000), ref: 00699249
                                • #17.COMCTL32(?,00000000,?,?,?,?,?,?,?,?,006960A7,00000010,00000000), ref: 00699265
                                • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,006960A7,00000010,00000000), ref: 00699271
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Library$AddressFreeHandleLoadModuleProc
                                • String ID: COMCTL32.DLL$InitCommonControlsEx
                                • API String ID: 1437655972-4218389149
                                • Opcode ID: 37a4bdbc32809743f3fffd6b1049c67fb2f92ccc3d4172ace63338cc51eb861e
                                • Instruction ID: 0fcf378e3cd2df81f391a590d18020e8c41003aebe46182a16113da8587b8c0e
                                • Opcode Fuzzy Hash: 37a4bdbc32809743f3fffd6b1049c67fb2f92ccc3d4172ace63338cc51eb861e
                                • Instruction Fuzzy Hash: B9F02836654212A79F11AFA89C4894B76EFEF957617051428F505F3310CB60FD088FB1
                                APIs
                                • #3.ODBC32(?,?), ref: 0066315E
                                • #19.ODBC32(?,?,000000FD,?,00000000,?,?,?), ref: 006631A7
                                • #72.ODBC32(?,?,00000001,00000001,000000FF,00000000,00000000,?,00000000,FFFFFFFD,?,?,00000001,000000FE,000000FC,00000001), ref: 0066320E
                                • #72.ODBC32(?,?,00000001,000000FE,000000FC,00000001,00000000,?,00000001,00000001,?,00000000,?,?,?,000000FD), ref: 0066322F
                                • #12.ODBC32(?,?,00000000,?,?,?,000000FD,?,00000000,?,?,?), ref: 0066323E
                                  • Part of subcall function 0067D5CF: __EH_prolog.LIBCMT ref: 0067D5D4
                                • #18.ODBC32(?,?,?,00000000,?,?,?,00000000,?,?,?,000000FD,?,00000000,?,?), ref: 0066326F
                                • #13.ODBC32(?,?,?,?,00000000,?,?,?,00000000,?,?,?,000000FD,?,00000000,?), ref: 00663285
                                • #61.ODBC32(?,?,?,?,00000000,?,?,?,00000000,?,?,?,000000FD,?,00000000,?), ref: 006632AB
                                • #16.ODBC32(?,00000001,?,00000000,?,?,?,?,?,00000000,?,?,?,00000000,?,?), ref: 006632DF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: H_prolog
                                • String ID:
                                • API String ID: 3519838083-0
                                • Opcode ID: b2aea5b424d7e622b0eec6a75990a3fe05cacb132fec0d69f9b6b7183e70dc8a
                                • Instruction ID: e9eb0688e3759070c83910bcee0c4d8fb5021b5fff6c1b2442ddd03bac30b3ac
                                • Opcode Fuzzy Hash: b2aea5b424d7e622b0eec6a75990a3fe05cacb132fec0d69f9b6b7183e70dc8a
                                • Instruction Fuzzy Hash: 11518171900125ABDB54EBA8CD85EFFB77EEF85720F20821CB819A7381D6349E4187B5
                                APIs
                                • UnhookWindowsHookEx.USER32(?), ref: 1001950B
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 10019534
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 1001956D
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 100195A6
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 100195DF
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 10019618
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 10019651
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 1001968A
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 100196C3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$HookUnhookWindows
                                • String ID:
                                • API String ID: 4067003578-0
                                • Opcode ID: ccb9e22b7223a151e8cdee0c69a935e96b33eb5907197e5facc0244b726fac03
                                • Instruction ID: 68d6bc10badb6e31eff8a5ceec3b68c03d71041423b9f4d656f5879cd019a15e
                                • Opcode Fuzzy Hash: ccb9e22b7223a151e8cdee0c69a935e96b33eb5907197e5facc0244b726fac03
                                • Instruction Fuzzy Hash: 45613DB5900B418BC721CF6DC8C068AFBE5FB58250F95482EE1AE87352D735F984CB96
                                APIs
                                • GetClientRect.USER32(?,?), ref: 100121A6
                                • SelectObject.GDI32(?,?), ref: 100121CC
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 100121E4
                                • SelectObject.GDI32(?,00000000), ref: 100121EC
                                • 73F84D40.GDI32 ref: 1001224C
                                • CallWindowProcA.USER32(?,?,00000014,00000000,?), ref: 10012262
                                • SelectObject.GDI32(00000000,?), ref: 100122A0
                                • PatBlt.GDI32(00000000,00000000,00000000,?,00CC0020,00F00021), ref: 100122BE
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,00000001,00000000,00000000,00CC0020,00000000,?,?,?,00000000,00000000,00CC0020), ref: 10012316
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ObjectSelect$CallClientProcRectWindow
                                • String ID:
                                • API String ID: 1176863719-0
                                • Opcode ID: 8d9555288dfa4cb6b9910587152f2368e31d67d4d9cfedcddf4c0e453304757e
                                • Instruction ID: 521344e5b0112258a1cfddc808acbd5a461835463cd1efe4b2e01d7775b1bad5
                                • Opcode Fuzzy Hash: 8d9555288dfa4cb6b9910587152f2368e31d67d4d9cfedcddf4c0e453304757e
                                • Instruction Fuzzy Hash: BB51F9B9254300AFE214DB54CC86F6BB7A8EBC8B50F20491CFA4597391C6B5FC458BA6
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: PathRect$ClipSelect$BeginClientEmptyOffsetRectangleWindow
                                • String ID:
                                • API String ID: 926769777-0
                                • Opcode ID: 0826a6cac50ff6d8cc9cb84acf4d3d3ae261592e089b67d3ff386e635de06544
                                • Instruction ID: ba60728ec9fc36432d1322e881ef709b7ac6645eae2937ea16e8d96f42463b8c
                                • Opcode Fuzzy Hash: 0826a6cac50ff6d8cc9cb84acf4d3d3ae261592e089b67d3ff386e635de06544
                                • Instruction Fuzzy Hash: 4B413979609211AFE744EF04C884D9FB7E9EFC8761F50881DF94A87214D730E94ACBA2
                                APIs
                                • KillTimer.USER32(?,00006622,76C03760,00000000,100161F8,?,?), ref: 10016663
                                • KillTimer.USER32(?,00006623,?,?), ref: 1001666E
                                • KillTimer.USER32(?,00006624,?,?), ref: 10016679
                                • GetParent.USER32(?), ref: 100166B6
                                • SendMessageA.USER32(00000000,?,?), ref: 100166BF
                                • GetParent.USER32(?), ref: 100166CF
                                • SendMessageA.USER32(00000000,?,?), ref: 100166D2
                                • SendMessageA.USER32(?,?,?,00000000), ref: 100166FA
                                • SendMessageA.USER32(?,?,00000008,00000000), ref: 1001670B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$KillTimer$Parent
                                • String ID:
                                • API String ID: 639473585-0
                                • Opcode ID: 43e7f77cbceff515ad615a55a00688c3b258852cb15ecafe0dc3e5f4f77e3c47
                                • Instruction ID: 23e64ce1f8e016dc164ffd5e7c53ec1364c03778283d0123c89ade336ad14168
                                • Opcode Fuzzy Hash: 43e7f77cbceff515ad615a55a00688c3b258852cb15ecafe0dc3e5f4f77e3c47
                                • Instruction Fuzzy Hash: 1F212175200B01ABE664DB65CC51FA7B3EDEF88714F11481DF6569B290CAB1F841CB60
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10004809
                                • SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 1000482A
                                • SendMessageA.USER32(?,00000020,?,0202FFFE), ref: 10004847
                                • LoadCursorA.USER32(00000000,00007F84), ref: 1000486B
                                • SetCursor.USER32(00000000), ref: 10004872
                                • SendMessageA.USER32(?,?,0000000B,?), ref: 1000488F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$Cursor$EnabledLoadWindow
                                • String ID:
                                • API String ID: 952789742-0
                                • Opcode ID: 32ed43d69171fde928c40ca07546bdfc92c8bcd283c9c7b1e6585add4f52f139
                                • Instruction ID: a48a6881d2a0336a3b2bb6231070b8bc95643f1d678b29964c15dfe4c6f22d82
                                • Opcode Fuzzy Hash: 32ed43d69171fde928c40ca07546bdfc92c8bcd283c9c7b1e6585add4f52f139
                                • Instruction Fuzzy Hash: 0521BE75609763AFF250CB64EC88F8B37E8EF58750F128C14F241D6990CBA0E8458795
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 10004439
                                • SendMessageA.USER32(?,00000020,?,0200FFFE), ref: 1000445A
                                • SendMessageA.USER32(?,00000020,?,0202FFFE), ref: 10004477
                                • LoadCursorA.USER32(00000000,00007F84), ref: 1000449B
                                • SetCursor.USER32(00000000), ref: 100044A2
                                • SendMessageA.USER32(?,?,0000000A,?), ref: 100044BF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$Cursor$EnabledLoadWindow
                                • String ID:
                                • API String ID: 952789742-0
                                • Opcode ID: e8c35d7865301e7346ea7a2614379b4a33c7a3f3bf2c79482a3e40d957fdedee
                                • Instruction ID: 4b1eefcfb1eff533e0469eb4f3c20f4418bd10dfbad317feed312d8172fc31b6
                                • Opcode Fuzzy Hash: e8c35d7865301e7346ea7a2614379b4a33c7a3f3bf2c79482a3e40d957fdedee
                                • Instruction Fuzzy Hash: 5D21D175709723AFF650CB64EC88F8B37E8EF59750F128804F242D7890C6A0E846C795
                                APIs
                                • IsWindowVisible.USER32(?), ref: 10015860
                                • SelectObject.GDI32(?,?), ref: 10015903
                                • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1001592F
                                • SelectObject.GDI32(?,?), ref: 100159B3
                                • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 100159C9
                                • 73F84D40.GDI32(?,?,76C22370,?,?,?,00000000,00000000,00CC0020), ref: 10015B86
                                  • Part of subcall function 1000FC70: SelectObject.GDI32(?,?), ref: 1000FC7A
                                  • Part of subcall function 1000FC70: DeleteDC.GDI32 ref: 1000FC83
                                  • Part of subcall function 1000FC70: DeleteObject.GDI32(?), ref: 1000FC8D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$Delete$VisibleWindow
                                • String ID: s
                                • API String ID: 2338221860-453955339
                                • Opcode ID: 421cafb401685e9174eb1292b169dd592b5d176713f7d8995dcaaaaccdaf3922
                                • Instruction ID: f04d0c149d7934839a0fbc71b930f3873cc576cb42b8e8f7a274e06dc9e73843
                                • Opcode Fuzzy Hash: 421cafb401685e9174eb1292b169dd592b5d176713f7d8995dcaaaaccdaf3922
                                • Instruction Fuzzy Hash: 79B104B8200205AFE714CF54C8C5EAB77A8FF88B44F14496CF8498B256DB75ED46CBA1
                                APIs
                                • GetMenuItemCount.USER32(?), ref: 10022B92
                                • GetMenuItemInfoA.USER32 ref: 10022BD3
                                • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 10022D74
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ItemMenu$??2@CountInfo
                                • String ID: 0
                                • API String ID: 343086914-4108050209
                                • Opcode ID: 7604f01f02f115ee7be7c09a562ee55d0e31972dcad4367c5aef172024b37c1e
                                • Instruction ID: eeaf9257602ae2fb2291704959b8afc54feedf824bc9d131a5182b5c0530c076
                                • Opcode Fuzzy Hash: 7604f01f02f115ee7be7c09a562ee55d0e31972dcad4367c5aef172024b37c1e
                                • Instruction Fuzzy Hash: 97717EB0604246AFE754CF64E880A5ABBE5FF84744FA5C52EE809CB751E731EC42CB81
                                APIs
                                • __EH_prolog.LIBCMT ref: 0067F441
                                • #11.ODBC32(000000FF,?,000000FD,?,?,?,?,?,?,?,State:S1C00), ref: 0067F467
                                • #19.ODBC32(00000001,?,000000FD,?,?,00000000,?,?,00664A46,000000FF,00000000,00000000,?), ref: 0067F47D
                                • #51.ODBC32(000000FF,00000007,00000001,?,?,?,?,?,?,?,State:S1C00), ref: 0067F535
                                • #12.ODBC32(00000001,?,00000000,?,?,00664A46,000000FF,00000000,00000000,?), ref: 0067F575
                                • #46.ODBC32(00000001,00000007,?,?,00000000,?,?,00664A46,000000FF,00000000,00000000,?), ref: 0067F5B3
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: H_prolog
                                • String ID: State:S1C00
                                • API String ID: 3519838083-3597892918
                                • Opcode ID: dc3f0704b099b72b5fe1eebc55fc5ff765f4eb3156c1dc0626ebc221ebf720de
                                • Instruction ID: 96e462b3294693508971a56b9d159ad17172f2236cc2fe8d4cfadf3e77a848d9
                                • Opcode Fuzzy Hash: dc3f0704b099b72b5fe1eebc55fc5ff765f4eb3156c1dc0626ebc221ebf720de
                                • Instruction Fuzzy Hash: 71519C312006019FEB25DF68C849FAAB7E7BF54714F14892EE1AAD72A1DB70AD41DB10
                                APIs
                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 10024BB5
                                • GetMenuItemCount.USER32(?), ref: 10024BC4
                                • GetMenuItemInfoA.USER32 ref: 10024C09
                                • SetMenuItemInfoA.USER32(?,00000000,00000400,?), ref: 10024C73
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,10024A51,?,?,00000000), ref: 10024CC7
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,10024A51,?,?,00000000), ref: 10024CD0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@ItemMenu$Info$Count
                                • String ID: 0
                                • API String ID: 1300621985-4108050209
                                • Opcode ID: db8b0735270c628eb056c6a9a50a2a714bdc7e32e5f6497291ea89124fa9fdc6
                                • Instruction ID: ba23ef1283d543214e51f6240621ccfcbfd39c9ee9b7c6bd65e8a0915674a4ed
                                • Opcode Fuzzy Hash: db8b0735270c628eb056c6a9a50a2a714bdc7e32e5f6497291ea89124fa9fdc6
                                • Instruction Fuzzy Hash: 1D519E746012028FD754CF18E8C4A56B7F9EF88754F66C669E809CB350EB31EC42CB91
                                APIs
                                • GetStringTypeW.KERNEL32(00000001,0087FA3C,00000001,?,7556E860,0090D264,?,?,0068403D,?,?,?,00000000,00000001), ref: 0068F2BF
                                • GetStringTypeA.KERNEL32(00000000,00000001,0087FA38,00000001,?,?,0068403D,?,?,?,00000000,00000001), ref: 0068F2D9
                                • GetStringTypeA.KERNEL32(?,?,?,?,=@h,7556E860,0090D264,?,?,0068403D,?,?,?,00000000,00000001), ref: 0068F30D
                                • MultiByteToWideChar.KERNEL32(?,0090D265,?,?,00000000,00000000,7556E860,0090D264,?,?,0068403D,?,?,?,00000000,00000001), ref: 0068F345
                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,0068403D,?), ref: 0068F39B
                                • GetStringTypeW.KERNEL32(?,?,00000000,=@h,?,?,?,?,?,?,0068403D,?), ref: 0068F3AD
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: StringType$ByteCharMultiWide
                                • String ID: =@h
                                • API String ID: 3852931651-1625426366
                                • Opcode ID: 823584412d834f5e73764d503d097cd02297b398649b21cfc71e2f8c9839f7c1
                                • Instruction ID: aee5b141489bfa8e13c30a0d60d480a468f2d7fbc3131b24c3085c104f363943
                                • Opcode Fuzzy Hash: 823584412d834f5e73764d503d097cd02297b398649b21cfc71e2f8c9839f7c1
                                • Instruction Fuzzy Hash: 1441AB72A00219AFCF21AF95DC86DEE7F7AFB09710F100629F915E2261D331DA519BE0
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$EqualOffsetWindow$InfoVisible
                                • String ID: <
                                • API String ID: 2641278648-4251816714
                                • Opcode ID: 43b4f7e995c0a357d226bfec25f4c2e0ace47f82f58a39247d552d2796c55144
                                • Instruction ID: 43e9ea39151c7cd5d2d9fc7f3b5f0f6f8eba1aada2934db523e61a0316c8f1e6
                                • Opcode Fuzzy Hash: 43b4f7e995c0a357d226bfec25f4c2e0ace47f82f58a39247d552d2796c55144
                                • Instruction Fuzzy Hash: 294128756047029FD354CF28D484A9BB7E8FFC8304F518A2EF89987250DB31E946CB62
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 0068851F
                                • GetStdHandle.KERNEL32(000000F4,0087F7BC,00000000,00000000,00000000,?), ref: 006885F5
                                • WriteFile.KERNEL32(00000000), ref: 006885FC
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: File$HandleModuleNameWrite
                                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                • API String ID: 3784150691-4022980321
                                • Opcode ID: 07970004debe172317d1dd19b29694db1808d9fdb62bffb4da9847a9c0160a7b
                                • Instruction ID: 77fe0ad8d2f4b9c1575a17b3bd318a33be00da713a1af6846af1789f498af10c
                                • Opcode Fuzzy Hash: 07970004debe172317d1dd19b29694db1808d9fdb62bffb4da9847a9c0160a7b
                                • Instruction Fuzzy Hash: 3C31D8726002185EEF20B7A0CC45FDA736EFF46300F504A7AF645E7241EA74E9818B56
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6d6de7a768be5ead32382cdc21de427f2c4f9e8752da9d0d89bdfa833a855e63
                                • Instruction ID: 8537e0ab13999d065024f23fa1a23548df020667e1ac877825fc5b978c423c7b
                                • Opcode Fuzzy Hash: 6d6de7a768be5ead32382cdc21de427f2c4f9e8752da9d0d89bdfa833a855e63
                                • Instruction Fuzzy Hash: CAC1B5741497829FDB1ACF25C0A442EBBE1BFCA314F24888DE8998B764C776D855CB42
                                APIs
                                • GetModuleHandleA.KERNEL32(User32,UpdateLayeredWindow,00000000,?,?,1001928B), ref: 1001A715
                                • GetProcAddress.KERNEL32(00000000), ref: 1001A71E
                                • GetModuleHandleA.KERNEL32(User32,SetLayeredWindowAttributes,?,?,1001928B), ref: 1001A72C
                                • GetProcAddress.KERNEL32(00000000), ref: 1001A72F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: SetLayeredWindowAttributes$UpdateLayeredWindow$User32
                                • API String ID: 1646373207-1189491841
                                • Opcode ID: b978585602eefc31c83160de33f8556ed3312a0566cad042a39d1910bad30d93
                                • Instruction ID: e5961c9c5a536ee549249fec62f5ee9ffd92b965adf733a9a8c24a5aa6594063
                                • Opcode Fuzzy Hash: b978585602eefc31c83160de33f8556ed3312a0566cad042a39d1910bad30d93
                                • Instruction Fuzzy Hash: 58D05B766012186FD610FBF9AC98CA7F79CDD95551391452AF344D3111C7709C018BB0
                                APIs
                                • GetDeviceCaps.GDI32(?,00000058), ref: 006553FA
                                • GetDeviceCaps.GDI32(?,0000005A), ref: 00655403
                                • GetDeviceCaps.GDI32(?,0000006E), ref: 00655414
                                • GetDeviceCaps.GDI32(?,0000006F), ref: 00655431
                                • GetDeviceCaps.GDI32(?,00000070), ref: 00655446
                                • GetDeviceCaps.GDI32(?,00000071), ref: 0065545B
                                • GetDeviceCaps.GDI32(?,00000008), ref: 00655470
                                • GetDeviceCaps.GDI32(?,0000000A), ref: 00655485
                                  • Part of subcall function 006555E0: __ftol.LIBCMT ref: 006555E5
                                  • Part of subcall function 00655610: __ftol.LIBCMT ref: 00655615
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CapsDevice$__ftol
                                • String ID:
                                • API String ID: 1555043975-0
                                • Opcode ID: f188b425a3b516e5a2545e5bec3b397a633301c569b18d536f9cd7cccb7f84fe
                                • Instruction ID: 9dea135849bb40a06dcdcad671280fe9c915c9dcab27dd08f9e58671573cdb5c
                                • Opcode Fuzzy Hash: f188b425a3b516e5a2545e5bec3b397a633301c569b18d536f9cd7cccb7f84fe
                                • Instruction Fuzzy Hash: DA517A70208B40ABD300AF35C899A6FFBF5FFC9B01F81491CF5D956290DA71A9188B96
                                APIs
                                • GetDeviceCaps.GDI32(?,00000058), ref: 006133B8
                                • GetDeviceCaps.GDI32(?,0000005A), ref: 006133C1
                                • GetDeviceCaps.GDI32(?,0000006E), ref: 006133D2
                                • GetDeviceCaps.GDI32(?,0000006F), ref: 006133EF
                                • GetDeviceCaps.GDI32(?,00000070), ref: 00613404
                                • GetDeviceCaps.GDI32(?,00000071), ref: 00613419
                                • GetDeviceCaps.GDI32(?,00000008), ref: 0061342E
                                • GetDeviceCaps.GDI32(?,0000000A), ref: 00613443
                                  • Part of subcall function 00613180: __ftol.LIBCMT ref: 00613185
                                  • Part of subcall function 006131B0: __ftol.LIBCMT ref: 006131B5
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CapsDevice$__ftol
                                • String ID:
                                • API String ID: 1555043975-0
                                • Opcode ID: d7a10d4b0c9e1f62fb4caba7312571e537f11e1ef69fc4e0563845951c3b9785
                                • Instruction ID: 72b8e2cecdea49ebb0fb2c4e2fb836379c3ee27e5434308fcceaf1b6f3d5db4f
                                • Opcode Fuzzy Hash: d7a10d4b0c9e1f62fb4caba7312571e537f11e1ef69fc4e0563845951c3b9785
                                • Instruction Fuzzy Hash: 05514670508701AFD340EF6ACC86A6BBBF5FFC9700F05495CF68456290DB729A648B96
                                APIs
                                • CallWindowProcA.USER32(?,?,00000005,?,?), ref: 100106F0
                                • GetWindowRect.USER32(?,?), ref: 10010725
                                • OffsetRect.USER32(?,?,?), ref: 1001073E
                                • SelectObject.GDI32(?,?), ref: 10010782
                                • SelectObject.GDI32(?,00000000), ref: 100107C7
                                • CreateRectRgn.GDI32(00000000,00000000,?,?), ref: 100107D7
                                  • Part of subcall function 1001C210: GlobalAlloc.KERNEL32(00000002,00000660,75756BA0,00000000,00000000,?,?,?,10003905,?,00000000,?,1002CDA8,?,1002CDC8), ref: 1001C227
                                  • Part of subcall function 1001C210: GlobalLock.KERNEL32(00000000), ref: 1001C230
                                  • Part of subcall function 1001C210: SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
                                  • Part of subcall function 1001C210: GlobalUnlock.KERNEL32(00000000), ref: 1001C2EB
                                  • Part of subcall function 1001C210: GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
                                  • Part of subcall function 1001C210: GlobalLock.KERNEL32(00000000), ref: 1001C316
                                  • Part of subcall function 1001C210: SetRect.USER32(?,?,?,?,?), ref: 1001C339
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 100107F7
                                • DeleteObject.GDI32(00000000), ref: 100107FE
                                  • Part of subcall function 10006920: DeleteObject.GDI32(?), ref: 1000692E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: GlobalRect$Object$AllocDeleteLockSelectWindow$CallCombineCreateOffsetProcUnlock
                                • String ID:
                                • API String ID: 4094057805-0
                                • Opcode ID: 8d9b0bf1d7519ee72f556b295753cef8cb64391f53ae4860d5cb9819d170f47e
                                • Instruction ID: 73ca99926bc02046f123c486a2af454b80d39e45caa77a60c923b30de1dd379e
                                • Opcode Fuzzy Hash: 8d9b0bf1d7519ee72f556b295753cef8cb64391f53ae4860d5cb9819d170f47e
                                • Instruction Fuzzy Hash: 4041FA79204740AFE354CF64CC85E6BB7A9FBC8710F108A1CF65987251DB74E905CBA1
                                APIs
                                • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,1001B7C8,?,?,10025DCF,?), ref: 1001749D
                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,1001B7C8,?,?,10025DCF,?,?), ref: 100174B9
                                • CloseHandle.KERNEL32(00000000,?,?,?,?,1001B7C8,?,?,10025DCF,?,?), ref: 100174C6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: File$CloseCreateHandleSize
                                • String ID:
                                • API String ID: 1378416451-0
                                • Opcode ID: 2c01451aa05b8898809a72a0113405d7757f3eea56a2802639cca7eb58879ac2
                                • Instruction ID: 8b3d300d7cd505047f5b36438d5475ead2230649a77d8796dbb5cbe265e0d923
                                • Opcode Fuzzy Hash: 2c01451aa05b8898809a72a0113405d7757f3eea56a2802639cca7eb58879ac2
                                • Instruction Fuzzy Hash: 8411EB7734122027E220A659EC8DF6BB79CE7D9BB2F208136FA45D62C0D661EC568371
                                APIs
                                • VariantInit.OLEAUT32(?), ref: 005C322A
                                • VariantCopyInd.OLEAUT32(?,?), ref: 005C323B
                                • VariantClear.OLEAUT32(?), ref: 005C35DB
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Variant$ClearCopyInit
                                • String ID:
                                • API String ID: 1785138364-0
                                • Opcode ID: 9074d391dfd86444f1f3bc5a5f3f0fd26283b8a04de94400acadd5622b1bc764
                                • Instruction ID: 020b578692ec818d9be715ebca06b9396c519d359d6703a3c5666381a5a234e0
                                • Opcode Fuzzy Hash: 9074d391dfd86444f1f3bc5a5f3f0fd26283b8a04de94400acadd5622b1bc764
                                • Instruction Fuzzy Hash: 3EC17F75608246CFD714DF98C584F6ABFE4FB89B00F14882DE9818B390DA7ADE41CB52
                                APIs
                                • SelectObject.GDI32(00000000,?), ref: 1001189F
                                • IsRectEmpty.USER32(00000050), ref: 100118A9
                                • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 100118D6
                                • IsWindowEnabled.USER32(?), ref: 100118DC
                                • IsRectEmpty.USER32(00000060), ref: 1001196A
                                • PatBlt.GDI32(00000000,?,?,?,?,00F00021), ref: 10011991
                                • IsWindowEnabled.USER32(?), ref: 10011997
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: EmptyEnabledRectWindow$ObjectSelect
                                • String ID:
                                • API String ID: 2275352032-0
                                • Opcode ID: 61536b1bc63d1b18624d50eafd3497a21945634e6b3a74052bb211d21fc59686
                                • Instruction ID: a48e8d2156bf71d1f245c115769e0258ac4b106f3870a774a9d1c5f789da5c24
                                • Opcode Fuzzy Hash: 61536b1bc63d1b18624d50eafd3497a21945634e6b3a74052bb211d21fc59686
                                • Instruction Fuzzy Hash: 7B5159B82016019FE318CB55CCD4EAB73EAEF88754B118968E9598B715DB35FC82CB20
                                APIs
                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 10022E00
                                • GetWindowRect.USER32(?,?), ref: 10022E22
                                • GetMenuItemCount.USER32(?), ref: 10022E2F
                                • GetMenuItemRect.USER32(?,?,00000000,?), ref: 10022E5E
                                • OffsetRect.USER32(?,?,?), ref: 10022E8B
                                • GetSubMenu.USER32(?,?), ref: 10022F11
                                • ??2@YAPAXI@Z.MSVCRT(00000010), ref: 10022F29
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MenuRect$Item$??2@??3@CountOffsetWindow
                                • String ID:
                                • API String ID: 386475264-0
                                • Opcode ID: 8089e1a617a6e8cc98d1eeacfd2fb3d6702982595fa214f7e2881a2ea1b30c89
                                • Instruction ID: b4e87db7927906467f26b41a9e75fc39679a568fb5d8f31fe5ea3c43946c0583
                                • Opcode Fuzzy Hash: 8089e1a617a6e8cc98d1eeacfd2fb3d6702982595fa214f7e2881a2ea1b30c89
                                • Instruction Fuzzy Hash: 415153B4A083069FC708CF69D88095AFBE5FB88710F558A6DF85A8B311DB30E945CB81
                                APIs
                                • GetParent.USER32(?), ref: 00699071
                                • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 0069909A
                                • UpdateWindow.USER32(?), ref: 006990B6
                                • SendMessageA.USER32(?,00000121,00000000,?), ref: 006990DC
                                • SendMessageA.USER32(?,0000036A,00000000,00000001), ref: 006990FB
                                • UpdateWindow.USER32(?), ref: 0069913E
                                • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 00699171
                                  • Part of subcall function 006996FF: GetWindowLongA.USER32(?,000000F0), ref: 0069970B
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Message$Window$PeekSendUpdate$LongParent
                                • String ID:
                                • API String ID: 2853195852-0
                                • Opcode ID: f73c5ca41b3606affe9eaa7ad40c3c0ef4a441165c47baf3a41bc6554e482f2a
                                • Instruction ID: 5bc482d4f1a06a7329a34d5ef219eae9f06bec7e7fb06cfcf84be54289db93af
                                • Opcode Fuzzy Hash: f73c5ca41b3606affe9eaa7ad40c3c0ef4a441165c47baf3a41bc6554e482f2a
                                • Instruction Fuzzy Hash: 9C41A1306043419BDF20EF6A8848A6BBAEEFFD5B00F140A1DF49586691C772D945CBB2
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Path$Rect$BeginClientClipEmptyEnabledRectangleSelectWindow
                                • String ID:
                                • API String ID: 1084965025-0
                                • Opcode ID: c99acffac70395a903fcda901865948252828067514702023488eea6cbb16816
                                • Instruction ID: b8edb3d788cc78fff0226b0fdbf1bf844b5db10293aac1c63da7d3a1532afda8
                                • Opcode Fuzzy Hash: c99acffac70395a903fcda901865948252828067514702023488eea6cbb16816
                                • Instruction Fuzzy Hash: 1A4146B8205201AFD308DF14C884E6BB7E8EF89750F15856DF9458B265D730ED89CBA2
                                APIs
                                • GetMenuItemCount.USER32(?), ref: 10011314
                                • GetMenuItemInfoA.USER32 ref: 10011357
                                • SetMenuItemInfoA.USER32(?,00000000,00000400,00000400), ref: 100113C7
                                • ??3@YAXPAX@Z.MSVCRT ref: 1001141C
                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 10011425
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ItemMenu$??3@Info$Count
                                • String ID: 0
                                • API String ID: 736798657-4108050209
                                • Opcode ID: d3c2b47d8225addc68ad56b22471a1853af76f7ec8e84051da2f3aa790ca5467
                                • Instruction ID: 6d719e0a32b6bda592360f4ae478a4486d40816c5b56cfaf3c9dbc286bc1d952
                                • Opcode Fuzzy Hash: d3c2b47d8225addc68ad56b22471a1853af76f7ec8e84051da2f3aa790ca5467
                                • Instruction Fuzzy Hash: 39316D746043129FD708CF18C880A9AB3E9FF88B58F258529F959DB351E731EC82CB52
                                APIs
                                • GetClientRect.USER32(?,00000000), ref: 1000C5E8
                                • InflateRect.USER32(000000FE,000000FE,000000FE), ref: 1000C5F9
                                • CallWindowProcA.USER32(?,?,0000000F,?,?), ref: 1000C61A
                                • GetClientRect.USER32(?,?), ref: 1000C62B
                                • InflateRect.USER32(?,000000FE,000000FE), ref: 1000C661
                                • IsWindowEnabled.USER32(?), ref: 1000C667
                                • GetFocus.USER32 ref: 1000C675
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$ClientInflateWindow$CallEnabledFocusProc
                                • String ID:
                                • API String ID: 3997489093-0
                                • Opcode ID: 81175768eda5f638bfd17fee8b037c0f1c98ebf9303a901b092cef3987487af0
                                • Instruction ID: 0210b2d985ab851d087a4ba75c5b64220f905e20614fa079e217abae1528d616
                                • Opcode Fuzzy Hash: 81175768eda5f638bfd17fee8b037c0f1c98ebf9303a901b092cef3987487af0
                                • Instruction Fuzzy Hash: FD314A75604301AFD314DF6AC880D1BF7E9EFC9254F208A1DF59983365DA32E846CB92
                                APIs
                                  • Part of subcall function 0069FC12: __EH_prolog.LIBCMT ref: 0069FC17
                                  • Part of subcall function 006996FF: GetWindowLongA.USER32(?,000000F0), ref: 0069970B
                                • SendMessageA.USER32(?,000001A1,00000000,00000000), ref: 0069E3B7
                                • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 0069E3C6
                                • SendMessageA.USER32(?,0000018E,00000000,00000000), ref: 0069E3DF
                                • SendMessageA.USER32(?,0000018E,00000000,00000000), ref: 0069E407
                                • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 0069E416
                                • SendMessageA.USER32(?,00000198,?,?), ref: 0069E42C
                                • PtInRect.USER32(?,000000FF,?), ref: 0069E438
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$H_prologLongRectWindow
                                • String ID:
                                • API String ID: 2846605207-0
                                • Opcode ID: 243a27d41d8f7b95d7d9ecae46e929af30624eb6a9ae17f641d5c39d4ed95de7
                                • Instruction ID: 06c8cd39e9662d91f343a77c1861e5b3e6a95a3c310dd1b99d7e80caa355bca5
                                • Opcode Fuzzy Hash: 243a27d41d8f7b95d7d9ecae46e929af30624eb6a9ae17f641d5c39d4ed95de7
                                • Instruction Fuzzy Hash: 42310470A00209FFDF10DFA8DC81DAEB7FAEB44748B218469E511A72A1D671AE12DB10
                                APIs
                                • GetClientRect.USER32(?,?), ref: 1000AE2F
                                • GetWindowRect.USER32(?,?), ref: 1000AE3B
                                • ClientToScreen.USER32(?,?), ref: 1000AE4D
                                • ClientToScreen.USER32(?,?), ref: 1000AE55
                                • OffsetRect.USER32(?,?,?), ref: 1000AE70
                                • OffsetRect.USER32(?,?,?), ref: 1000AE85
                                • EqualRect.USER32(?,?), ref: 1000AE91
                                  • Part of subcall function 1000AF00: EqualRect.USER32(1000AEEB,?), ref: 1000AF0A
                                  • Part of subcall function 1000AF00: IsRectEmpty.USER32(?), ref: 1000AF21
                                  • Part of subcall function 1000AF00: CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF49
                                  • Part of subcall function 1000AF00: CreateRectRgn.GDI32(?,?,?,?), ref: 1000AF61
                                  • Part of subcall function 1000AF00: CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 1000AF6A
                                  • Part of subcall function 1000AF00: SelectClipRgn.GDI32(?,00000000), ref: 1000AF72
                                  • Part of subcall function 1000AF00: DeleteObject.GDI32(00000000), ref: 1000AF7F
                                  • Part of subcall function 1000AF00: DeleteObject.GDI32(00000000), ref: 1000AF82
                                  • Part of subcall function 1000AF00: CreatePen.GDI32(00000000,00000001,?), ref: 1000AFA1
                                  • Part of subcall function 1000AF00: CreateSolidBrush.GDI32(?), ref: 1000B041
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,00000000), ref: 1000B051
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,00000000), ref: 1000B059
                                  • Part of subcall function 1000AF00: Rectangle.GDI32(?,?,?,?,?), ref: 1000B074
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,?), ref: 1000B080
                                  • Part of subcall function 1000AF00: SelectObject.GDI32(?,?), ref: 1000B088
                                  • Part of subcall function 1000AF00: IsRectEmpty.USER32(?), ref: 1000B08F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Object$Select$Create$Client$DeleteEmptyEqualOffsetScreen$BrushClipCombineRectangleSolidWindow
                                • String ID:
                                • API String ID: 1135996890-0
                                • Opcode ID: b217bab60f10c5aea6f42e71060e513870f453460a2ff76ab6cc9e0435775f34
                                • Instruction ID: bacedecaa7b5975dfe14453393d98d9b711d5753841d023854cdc35a831728b0
                                • Opcode Fuzzy Hash: b217bab60f10c5aea6f42e71060e513870f453460a2ff76ab6cc9e0435775f34
                                • Instruction Fuzzy Hash: 59211979109201AFE304DF19C885C6BBBF9EFC9350F11CA1DF44987225D634EA46CBA2
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 10008BBA
                                  • Part of subcall function 1000CD20: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10007458,?,?,?,?,?,10027373,000000FF,10007408), ref: 1000CD95
                                • RemovePropA.USER32(?,SHE_E), ref: 10008BD2
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027404,000000FF,10008B58), ref: 10008BE6
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027404,000000FF,10008B58), ref: 10008C10
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D$SHE_E
                                • API String ID: 1378348335-1595638419
                                • Opcode ID: 9ad5bbbc9b323f0afc41a5c25cbfbc6780b7d4b2a62ad30eccf9ebe4d4521583
                                • Instruction ID: 4856fc888e7d091422dc3a361147995440e5673d3ac1890a2cd9819baa295a63
                                • Opcode Fuzzy Hash: 9ad5bbbc9b323f0afc41a5c25cbfbc6780b7d4b2a62ad30eccf9ebe4d4521583
                                • Instruction Fuzzy Hash: A621AFB56007829FD710CF5AD8C0A8AF7E4FB48210F804A2DF16987341C778E9498B91
                                APIs
                                • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0067D34C
                                • GetSystemMetrics.USER32(00000000), ref: 0067D364
                                • GetSystemMetrics.USER32(00000001), ref: 0067D36B
                                • lstrcpyA.KERNEL32(?,DISPLAY), ref: 0067D38F
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: System$Metrics$InfoParameterslstrcpy
                                • String ID: B$DISPLAY
                                • API String ID: 1409579217-3316187204
                                • Opcode ID: 3d92a58d67bb663b2e4d8419ad9019150ed779fce1fc04dc508102e35c295a81
                                • Instruction ID: 6a86821031a40c2b99232af106885397d875c055cdff39831733ca0adffed11b
                                • Opcode Fuzzy Hash: 3d92a58d67bb663b2e4d8419ad9019150ed779fce1fc04dc508102e35c295a81
                                • Instruction Fuzzy Hash: EF117371A00324ABDF119F64DC8499B7FBEEF0A765B008856FD099E145D6B1E940CBE1
                                APIs
                                  • Part of subcall function 0069C22C: __EH_prolog.LIBCMT ref: 0069C231
                                  • Part of subcall function 0069C22C: CreateSolidBrush.GDI32(?), ref: 0069C24E
                                • FillRect.USER32(?,?,?), ref: 00642322
                                • FillRect.USER32(?,?,?), ref: 00642372
                                • IntersectRect.USER32(?,?,?), ref: 00642383
                                • FillRect.USER32(?,?,?), ref: 006423D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Fill$BrushCreateH_prologIntersectSolid
                                • String ID:
                                • API String ID: 3792315602-0
                                • Opcode ID: 5a1ffae9df2e947c2d9c3b506d17f5b799254f19d2cb56efe7694d94ce037142
                                • Instruction ID: 0e7d785861f6ffc4850de074db242c5bcd1e98cb8e169134b9d54229329a54dd
                                • Opcode Fuzzy Hash: 5a1ffae9df2e947c2d9c3b506d17f5b799254f19d2cb56efe7694d94ce037142
                                • Instruction Fuzzy Hash: C38114B16087818FC705CF68C490A5FFBE6BBD9700F508A2DF59983250EB74E909CB56
                                APIs
                                  • Part of subcall function 10016440: GetCursorPos.USER32(?), ref: 1001644C
                                  • Part of subcall function 10016440: GetWindowRect.USER32(?,?), ref: 1001645B
                                • OffsetRect.USER32(?,00000000,?), ref: 1001683C
                                • OffsetRect.USER32(?,00000000,?), ref: 10016852
                                • OffsetRect.USER32(?,00000000,?), ref: 1001686D
                                • MulDiv.KERNEL32(?,?,?), ref: 100168B4
                                • GetParent.USER32(?), ref: 100168F6
                                • SendMessageA.USER32(?,?,00000000,00000000), ref: 10016918
                                  • Part of subcall function 10015840: IsWindowVisible.USER32(?), ref: 10015860
                                  • Part of subcall function 10015840: SelectObject.GDI32(?,?), ref: 10015903
                                  • Part of subcall function 10015840: PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1001592F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Offset$Window$CursorMessageObjectParentSelectSendVisible
                                • String ID:
                                • API String ID: 410164804-0
                                • Opcode ID: e54e0525136698f0fd5e31759bfa30945750bee2bbb6fc76e0388ad5adbd1f6c
                                • Instruction ID: 5b3f42e8751718efe35102d26408225ceaa88a89c417ccc3e437b77936ff3ce4
                                • Opcode Fuzzy Hash: e54e0525136698f0fd5e31759bfa30945750bee2bbb6fc76e0388ad5adbd1f6c
                                • Instruction Fuzzy Hash: 6D611774204606AFD708DF39CD94A6AB7E9FB88704F108A1DF85A9B344DB30FA45CB95
                                APIs
                                • SetTextColor.GDI32(00000000,?), ref: 10010CEA
                                • SelectObject.GDI32(?,?), ref: 10010D3A
                                • _mbsstr.MSVCRT ref: 10010D4A
                                • DrawTextA.USER32(?,?,00000000,?,00000024), ref: 10010D6C
                                • DrawTextA.USER32(00000000,00000001,?,?,00000026), ref: 10010D9F
                                • DrawTextA.USER32(?,?,?,?,00000024), ref: 10010DC7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Text$Draw$ColorObjectSelect_mbsstr
                                • String ID:
                                • API String ID: 2554462136-0
                                • Opcode ID: 167540bd5a1515ecb06707f3ebbd2082f6ec1e01a77e5fac4a1d7c74e16ee5d3
                                • Instruction ID: caa0527cdf57b14729ef594e8188670eae6bffac27ed0865ed6a9a4dbb4e9640
                                • Opcode Fuzzy Hash: 167540bd5a1515ecb06707f3ebbd2082f6ec1e01a77e5fac4a1d7c74e16ee5d3
                                • Instruction Fuzzy Hash: E4515C792042009FD308CF68C884E67B7E9FF88354F108A6DF9598B355DB70E946CBA1
                                APIs
                                • OffsetRect.USER32(?,?,00000000), ref: 1000E6C6
                                • OffsetRect.USER32(?,?,?), ref: 1000E76A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: OffsetRect
                                • String ID:
                                • API String ID: 177026234-0
                                • Opcode ID: aaa94e786c78679375264d08a80620499181ed88b43f71d2a266caf68266feef
                                • Instruction ID: 55dceb283fd2939f53b1af87dd3abf76b527e98de1fc72b27c0b69958cadab38
                                • Opcode Fuzzy Hash: aaa94e786c78679375264d08a80620499181ed88b43f71d2a266caf68266feef
                                • Instruction Fuzzy Hash: 70314B763029559FF3049E7C9E8CABEBBCAD7C82A2F29573DF606D1048D661FC094250
                                APIs
                                • __EH_prolog.LIBCMT ref: 006806A7
                                • #48.ODBC32(?,?,00000000), ref: 006806BB
                                • GlobalLock.KERNEL32(?), ref: 00680735
                                • #49.ODBC32(?,?,?), ref: 00680747
                                • GlobalUnlock.KERNEL32(?), ref: 00680757
                                • #48.ODBC32(?,?), ref: 00680772
                                  • Part of subcall function 006858FC: RaiseException.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,006821F4,00000000), ref: 0068592A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$ExceptionH_prologLockRaiseUnlock
                                • String ID:
                                • API String ID: 1299615377-0
                                • Opcode ID: f216b533cf29f951813062e89956d41cd7d69c7d789d2bd50da68a0e77e6902a
                                • Instruction ID: 90245e2c23bcce400738da4a55848418ff0d8a6b6aac229dd886ea8835982fc9
                                • Opcode Fuzzy Hash: f216b533cf29f951813062e89956d41cd7d69c7d789d2bd50da68a0e77e6902a
                                • Instruction Fuzzy Hash: D141BF31A00116AFDF51AF64C889DEDBBB7EF48340F104529F906E7261DB709D95DB90
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 10015671
                                • GetClientRect.USER32(?,?), ref: 10015680
                                • ClientToScreen.USER32(?,?), ref: 10015695
                                • ClientToScreen.USER32(?,?), ref: 100156A0
                                • OffsetRect.USER32(?,?,?), ref: 100156BB
                                • OffsetRect.USER32(?,?,?), ref: 100156D0
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Client$OffsetScreen$Window
                                • String ID:
                                • API String ID: 3447441489-0
                                • Opcode ID: 7cd20ebc07aa8017c6d87fa62e7aa96f440e11c1cf49f979fd91717a38e00a84
                                • Instruction ID: c2827e8d9cd10a597387bf157e688e7552e1f46be816908af53a9ee1b8aa0ec2
                                • Opcode Fuzzy Hash: 7cd20ebc07aa8017c6d87fa62e7aa96f440e11c1cf49f979fd91717a38e00a84
                                • Instruction Fuzzy Hash: E241F578204706DFD714CF29C881EA7B7E9EF88754F14891DE89ACB250E731F9858BA1
                                APIs
                                • IsRectEmpty.USER32(?), ref: 10025A15
                                • SelectObject.GDI32(?,?), ref: 10025A7D
                                • SelectObject.GDI32(?,00000000), ref: 10025AC2
                                  • Part of subcall function 1001C210: GlobalAlloc.KERNEL32(00000002,00000660,75756BA0,00000000,00000000,?,?,?,10003905,?,00000000,?,1002CDA8,?,1002CDC8), ref: 1001C227
                                  • Part of subcall function 1001C210: GlobalLock.KERNEL32(00000000), ref: 1001C230
                                  • Part of subcall function 1001C210: SetRect.USER32(00000010,7FFFFFFF,7FFFFFFF,00000000,00000000), ref: 1001C25D
                                  • Part of subcall function 1001C210: GlobalUnlock.KERNEL32(00000000), ref: 1001C2EB
                                  • Part of subcall function 1001C210: GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 1001C30D
                                  • Part of subcall function 1001C210: GlobalLock.KERNEL32(00000000), ref: 1001C316
                                  • Part of subcall function 1001C210: SetRect.USER32(?,?,?,?,?), ref: 1001C339
                                • OffsetRgn.GDI32(00000000,00000000,?), ref: 10025AE4
                                • CombineRgn.GDI32(00000000,00000000,00000000,00000003), ref: 10025AF8
                                • DeleteObject.GDI32(00000000), ref: 10025AFF
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$ObjectRect$AllocLockSelect$CombineDeleteEmptyOffsetUnlock
                                • String ID:
                                • API String ID: 505361263-0
                                • Opcode ID: 29ebdb5e4d99459ae6c459a07793ccd64b701410539c83b757910fb199093e9e
                                • Instruction ID: cf9c318b9d579a266dc806ebc7a0d6f04a146a731b116f9e3c9b73cee362de29
                                • Opcode Fuzzy Hash: 29ebdb5e4d99459ae6c459a07793ccd64b701410539c83b757910fb199093e9e
                                • Instruction Fuzzy Hash: 7F41FB79604751AFD314CF64C880E6BB7E8FF88650F208A1DF55587641DB34E909CBA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: wsprintf
                                • String ID: - $ - [$%d / %d]$?? / %d]
                                • API String ID: 2111968516-3107364983
                                • Opcode ID: 219ab6e0df89051af13f074660a22bd435b658978a66fc154ae35f5129cb4a73
                                • Instruction ID: cd0626cc5af77019f62b0781bd9c40f17dba7fbce7b4c9aa1ad790ef79927aa4
                                • Opcode Fuzzy Hash: 219ab6e0df89051af13f074660a22bd435b658978a66fc154ae35f5129cb4a73
                                • Instruction Fuzzy Hash: D4319574104741AFD714EB25C851BAF7BEAFF84710F044A1CF5AA87691DB74E804CB52
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 1001DC52
                                • GetCursorPos.USER32(?), ref: 1001DC5D
                                • SendMessageA.USER32(?,00001200,00000000,00000000), ref: 1001DC92
                                • SendMessageA.USER32(?,0000120F,00000000,00000000), ref: 1001DCB0
                                • SendMessageA.USER32(?,00001207,00000000,?), ref: 1001DCC1
                                • PtInRect.USER32(?,?,?), ref: 1001DCD2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$Rect$CursorWindow
                                • String ID:
                                • API String ID: 1680679697-0
                                • Opcode ID: fc3e80be71d03c64dc65eb24677b2ab1e78b96a8fe08b6872ed11463f4ba74dc
                                • Instruction ID: b91518a891387c981cce0504226fb2a498f6544864ac186356a6de0c8c4ec29a
                                • Opcode Fuzzy Hash: fc3e80be71d03c64dc65eb24677b2ab1e78b96a8fe08b6872ed11463f4ba74dc
                                • Instruction Fuzzy Hash: 102181762043069FD304DF69CCC0E5BB7E8EBC8660F104A1EF551D7250D6B0E9498BA1
                                APIs
                                • GetCursorPos.USER32(?), ref: 1000DE3E
                                • GetWindowRect.USER32(?,?), ref: 1000DE4D
                                • SendMessageA.USER32(?,00001200,00000000,00000000), ref: 1000DE82
                                • SendMessageA.USER32(?,0000120F,00000000,00000000), ref: 1000DEA5
                                • SendMessageA.USER32(?,00001207,00000000), ref: 1000DEB1
                                • PtInRect.USER32(?,?,?), ref: 1000DEC2
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$Rect$CursorWindow
                                • String ID:
                                • API String ID: 1680679697-0
                                • Opcode ID: 93dd26b5b11665f8d53c80fd854311e6abff328d32208a84f31c42ea47ed69d3
                                • Instruction ID: 25e19ebef5cfb3a3824964290d61ec62e8227a99a9e9e0869e33b01463ce3919
                                • Opcode Fuzzy Hash: 93dd26b5b11665f8d53c80fd854311e6abff328d32208a84f31c42ea47ed69d3
                                • Instruction Fuzzy Hash: B02181752043069FE304DF65CCC0E6BB7E9EBC8660F104A1EF950C7250D670E9498B61
                                APIs
                                • GetCursorPos.USER32(?), ref: 1001EBD4
                                • GetWindowRect.USER32(?,?), ref: 1001EBE3
                                • GetClientRect.USER32(?,?), ref: 1001EBF2
                                • ClientToScreen.USER32(?,?), ref: 1001EC07
                                • ClientToScreen.USER32(?,?), ref: 1001EC12
                                • SendMessageA.USER32(?,00000445,00000000,?), ref: 1001EC54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Client$RectScreen$CursorMessageSendWindow
                                • String ID:
                                • API String ID: 1353371867-0
                                • Opcode ID: 7e52564109b9bdb87fea7c149928c1ee72434fd62f985c6adbb850f7f3630d07
                                • Instruction ID: c36cae17ecde68ff4f981e12f48877b9c68e936cd5b1928b6e4795760c61fe65
                                • Opcode Fuzzy Hash: 7e52564109b9bdb87fea7c149928c1ee72434fd62f985c6adbb850f7f3630d07
                                • Instruction Fuzzy Hash: 2B110479108746EFD708DF29C888D6BB7E8EBD8604F10C91DF58983220E670E94ACB52
                                APIs
                                • GetModuleHandleA.KERNEL32(00000000,?,?,10025E63,?,?,?,?,?,?), ref: 1001B8F4
                                • FindResourceA.KERNEL32(00000000,?,?), ref: 1001B913
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: FindHandleModuleResource
                                • String ID:
                                • API String ID: 3537982541-0
                                • Opcode ID: 20047523e8b2d551bcd9e8a145dcbb2bf7234696f2abbd8170a661a441ae52bd
                                • Instruction ID: 5268aa00fc51c7ef6193ce43b0a0328cd4925fc10cfa97f1260c64665a9d4d10
                                • Opcode Fuzzy Hash: 20047523e8b2d551bcd9e8a145dcbb2bf7234696f2abbd8170a661a441ae52bd
                                • Instruction Fuzzy Hash: 0501DF7A2056206BE3119728EC88D6F77ECEFC9211F114119FA44C7200DB34CE4387B1
                                APIs
                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 1001917A
                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 10019186
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 10019192
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 1001919E
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 100191AA
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 100191B6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@
                                • String ID:
                                • API String ID: 613200358-0
                                • Opcode ID: 3f9b1faf2624ccd382fc81ce35ce4ef0c2eebfc1694b7b4716764da7c7a510ad
                                • Instruction ID: b30d290d8c7ff241b3e1323c47ca36b58938814fe857fb6cef48acb235ac3c58
                                • Opcode Fuzzy Hash: 3f9b1faf2624ccd382fc81ce35ce4ef0c2eebfc1694b7b4716764da7c7a510ad
                                • Instruction Fuzzy Hash: ADE0757A51062057C224E7B4ACC1DD772A9BB4C210FA08D0CB19A47201C977F940E790
                                APIs
                                • 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B1A0
                                • 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B216
                                • 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B273
                                • 73F84D40.GDI32(?,?,?,?,?,?,?,?,00CC0020,?,?,?,?,?,?), ref: 1000B2C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: s
                                • API String ID: 0-453955339
                                • Opcode ID: bbb36afaebd339171a8ba2a9bff4ae1e802011074496994489dee8731f070884
                                • Instruction ID: 0e05779d305182e8bcc6fd0604af41abdce4d5981c7c16a485e6175e980c0b19
                                • Opcode Fuzzy Hash: bbb36afaebd339171a8ba2a9bff4ae1e802011074496994489dee8731f070884
                                • Instruction Fuzzy Hash: 9451E474209341AFD344CF1AC980A1BFBE9EFCC698F549A1DF99993314D670ED018B66
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 10009048
                                • CallWindowProcA.USER32(?,?,0000002B,?,?), ref: 100090CB
                                • CallWindowProcA.USER32(?,?,0000002B,00000000,?), ref: 10009100
                                • DeleteDC.GDI32(?), ref: 1000910C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow$DeleteProp
                                • String ID: SHE
                                • API String ID: 3390023778-2947365353
                                • Opcode ID: 088e118dbf137e4194a6ec5c3e0d9fc1955a6b201465a2604efd515ce137b97b
                                • Instruction ID: f2b3dcc440dab69ee4fbcbe6af92302eeabc2b2a5026597934c7d9f665362333
                                • Opcode Fuzzy Hash: 088e118dbf137e4194a6ec5c3e0d9fc1955a6b201465a2604efd515ce137b97b
                                • Instruction Fuzzy Hash: AA4134753007129FE310CF6AD884B66B7E8FF847D0F158129F9498B295D732E882CBA1
                                APIs
                                • GetVersionExA.KERNEL32 ref: 006882F3
                                • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00688328
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00688388
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: EnvironmentFileModuleNameVariableVersion
                                • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                • API String ID: 1385375860-4131005785
                                • Opcode ID: 94af1556f0b245b342947444a34c8bc539cffa10a11576685e282b386ffb88cd
                                • Instruction ID: e711b23e86686f6a9c9ebc6c6c9dd81053b4c16167e615c22803624999706171
                                • Opcode Fuzzy Hash: 94af1556f0b245b342947444a34c8bc539cffa10a11576685e282b386ffb88cd
                                • Instruction Fuzzy Hash: FA316A728402486FEF31B6B09C55BED37AB9B02B04F9806E9E145D7242EE31DEC9CB11
                                APIs
                                • SendMessageA.USER32(00000000,00000405,00000000,?), ref: 0069748C
                                • GetWindowLongA.USER32(?,000000FC), ref: 0069749D
                                • GetWindowLongA.USER32(?,000000FC), ref: 006974AD
                                • SetWindowLongA.USER32(?,000000FC,?), ref: 006974C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: LongWindow$MessageSend
                                • String ID: (
                                • API String ID: 2178440468-3887548279
                                • Opcode ID: db938a0cdbdfb20c5fa51ac76d47f27883471546cccb1947cb868377a9d71ae5
                                • Instruction ID: 37da72bb550271c7f463fab6653052be16214a687a3a4524bcb969ed7483fd9f
                                • Opcode Fuzzy Hash: db938a0cdbdfb20c5fa51ac76d47f27883471546cccb1947cb868377a9d71ae5
                                • Instruction Fuzzy Hash: E231BC716043109FDF20AF64D884AA9BBFABF18B10F15463DE15297A92CB31E804CF94
                                APIs
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 006A0573
                                  • Part of subcall function 006A065F: lstrlenA.KERNEL32(00000104,00000000,?,006A05A3), ref: 006A0696
                                • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 006A0614
                                • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 006A0641
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: FileModuleNamelstrcatlstrcpylstrlen
                                • String ID: .HLP$.INI
                                • API String ID: 2421895198-3011182340
                                • Opcode ID: 55cd4da48622da9d19cafa80e105268f3ada45c29d76e2ae2ce0f9f2a8426547
                                • Instruction ID: bb5a914b05cc9df30d1cfbb7ff47ca5335c8ba1d54d08bbdb34abafe3e34b1af
                                • Opcode Fuzzy Hash: 55cd4da48622da9d19cafa80e105268f3ada45c29d76e2ae2ce0f9f2a8426547
                                • Instruction Fuzzy Hash: 1C3170B68047189FEB61EF70DC85BC6B7FDAB09300F1049AAE19AD3141DB70AA84CF10
                                APIs
                                  • Part of subcall function 0069D721: GetParent.USER32(?), ref: 0069D754
                                  • Part of subcall function 0069D721: GetLastActivePopup.USER32(?), ref: 0069D763
                                  • Part of subcall function 0069D721: IsWindowEnabled.USER32(?), ref: 0069D778
                                  • Part of subcall function 0069D721: EnableWindow.USER32(?,00000000), ref: 0069D78B
                                • SendMessageA.USER32(?,00000376,00000000,00000000), ref: 0069D5DF
                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,?,00000000), ref: 0069D64D
                                • MessageBoxA.USER32(00000000,?,?,00000000), ref: 0069D65B
                                • EnableWindow.USER32(00000000,00000001), ref: 0069D677
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$EnableMessage$ActiveEnabledFileLastModuleNameParentPopupSend
                                • String ID: Xi
                                • API String ID: 1958756768-2979349729
                                • Opcode ID: 211dc28eeb8111620ac9b32c113debbaa03b7c72cf1509b70453b0c6c827acf2
                                • Instruction ID: 83128d53287917638478b32a671676b343dd92cb446c00c53c3908191ecaebcc
                                • Opcode Fuzzy Hash: 211dc28eeb8111620ac9b32c113debbaa03b7c72cf1509b70453b0c6c827acf2
                                • Instruction Fuzzy Hash: 94219F72A00208AFDF209FA4CCC5AEEB7BEEB04744F650439E618E7690C7719D41CBA0
                                APIs
                                • SelectObject.GDI32(?,00000000), ref: 1000E2A6
                                • SelectObject.GDI32(?,?), ref: 1000E2C0
                                • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,?,?,?,1000D0ED,?,?), ref: 1000E2DA
                                • ??2@YAPAXI@Z.MSVCRT(0000000C,?,?,?,?,1000D0ED,?,?,?,?,?), ref: 1000E2F0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ObjectSelect$??2@
                                • String ID: s
                                • API String ID: 2738994556-453955339
                                • Opcode ID: 9bd297f74d96eef5bb199b85e09045d6e339c48dbbaf093c3168865b39efbbd7
                                • Instruction ID: 676109a112f91462f0683b0e748601321322578746db1e72dd9edd93884032e7
                                • Opcode Fuzzy Hash: 9bd297f74d96eef5bb199b85e09045d6e339c48dbbaf093c3168865b39efbbd7
                                • Instruction Fuzzy Hash: 6F21F5B9601702AFE314CF59D884E16FBE8FB88751F20C62EFA5987751D730A841CBA0
                                APIs
                                • GetMenuItemInfoA.USER32 ref: 10009179
                                • SelectObject.GDI32(00000000,?), ref: 100091A7
                                • GetTextExtentPointA.GDI32(00000000,?,?,00000400), ref: 100091C7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ExtentInfoItemMenuObjectPointSelectText
                                • String ID: 0$@
                                • API String ID: 1214468274-1545510068
                                • Opcode ID: 917930f70828090b676f5c8c02eca02738ab7c5eca451f6404b20d046d03fd04
                                • Instruction ID: 3d2f61126256a53cf897c85a85e5fe7bc4fb7c3a9049d66df69f7ce8b741961f
                                • Opcode Fuzzy Hash: 917930f70828090b676f5c8c02eca02738ab7c5eca451f6404b20d046d03fd04
                                • Instruction Fuzzy Hash: 46111F75209300AFE750DB24C955BEFB7E8FBC4350F40491DF69992290DB79AA09CB92
                                APIs
                                • GetClientRect.USER32(?), ref: 1000772F
                                • GetPropA.USER32(?,SHE_H), ref: 1000773E
                                • SelectObject.GDI32(?,?), ref: 10007783
                                • PatBlt.GDI32(?,00F00021,?,?,?,00F00021), ref: 100077A3
                                  • Part of subcall function 1000B0C0: CreateSolidBrush.GDI32(?), ref: 1000B0C9
                                  • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B0DD
                                  • Part of subcall function 1000B0C0: PatBlt.GDI32(?,?,00000000,?,10007767,00F00021), ref: 1000B0FB
                                  • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B103
                                  • Part of subcall function 1000B0C0: DeleteObject.GDI32(00000000), ref: 1000B106
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$BrushClientCreateDeletePropRectSolid
                                • String ID: SHE_H
                                • API String ID: 3435410480-3561289158
                                • Opcode ID: ee39c86b8713ff7bd0879a4eba1016b9c2dcf60cedc71159b2e0360e7d2bf52b
                                • Instruction ID: 0ce474bad31ea1b146f6a7476c3485cc4b4618f4c22a3676eee4e6d7add3520a
                                • Opcode Fuzzy Hash: ee39c86b8713ff7bd0879a4eba1016b9c2dcf60cedc71159b2e0360e7d2bf52b
                                • Instruction Fuzzy Hash: 570117BA604211EFE204DB58CC84DABB7ACEFC8250F508A0DFA5983211D630ED45CBA2
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1000E4C5
                                • SendMessageA.USER32(?,00006A30,00000000,00000000), ref: 1000E4DB
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 1000E4F5
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 1000E512
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow$MessagePropSend
                                • String ID: SHE
                                • API String ID: 3197700573-2947365353
                                • Opcode ID: 16cd9c1c8a4f09862bd2c9aa2b2deed388164335538f6a85cc36725207bd56c1
                                • Instruction ID: 451063f49a3e527fd8d608dc22c3f8f1e55c4af648b6bbb05c8928ea7c27e05f
                                • Opcode Fuzzy Hash: 16cd9c1c8a4f09862bd2c9aa2b2deed388164335538f6a85cc36725207bd56c1
                                • Instruction Fuzzy Hash: EA014B7A201621EBE204DF54DC88EABB7ADEFD9761F20840DF60593241C721ED06CBB5
                                APIs
                                • RemovePropA.USER32(?,SHE_F), ref: 1002466D
                                • RemovePropA.USER32(?,SHE_F), ref: 1002467B
                                • RemovePropA.USER32(?,SHE_F), ref: 10024689
                                • RemovePropA.USER32(?,SHE_F), ref: 10024697
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: PropRemove
                                • String ID: SHE_F
                                • API String ID: 3213287156-872208577
                                • Opcode ID: 482fe341d6cdaa7da7b42383c716d25f52f4c96051cfc89517db10860ab7a2cb
                                • Instruction ID: 8634cc0847dbc949a985fe4dc17aacceb001e21e00327079f9f065a41ef256d6
                                • Opcode Fuzzy Hash: 482fe341d6cdaa7da7b42383c716d25f52f4c96051cfc89517db10860ab7a2cb
                                • Instruction Fuzzy Hash: 31019AB2541B489BC620EFBA9C84DD7F7EDAFE9301F514A2EE259D3210CA75A8018B50
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001BDFC
                                • SendMessageA.USER32(?,00006A31,00000000,00000000), ref: 1001BE12
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237,?,?,1001BB2D,?,?,10025F3F,?,?), ref: 1001BE30
                                • InvalidateRect.USER32(?,00000000,00000001,?,?,1001BB2D,?,?,10025F3F,?,?), ref: 1001BE3B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: InvalidateMessagePropRectSendWindow
                                • String ID: SHE
                                • API String ID: 1683571725-2947365353
                                • Opcode ID: f1fa45ef511af30ddd497535aa07129b0897fb5ddec85c8cb697c59cca0d390d
                                • Instruction ID: 61bc7c0cfe7dd8b66f4080b3c9d4250a00e71bb5cd075d56d4ab3ddb2b0c9d6c
                                • Opcode Fuzzy Hash: f1fa45ef511af30ddd497535aa07129b0897fb5ddec85c8cb697c59cca0d390d
                                • Instruction Fuzzy Hash: FBF0E535342A21FBF6515758AC89FCE37A59F85B10F200001F700EA1D0CBE49A834B55
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001C753
                                • LockWindowUpdate.USER32(?,?,10025F1F,?,?), ref: 1001C76F
                                • GetPropA.USER32(?,SHE), ref: 1001C781
                                • LockWindowUpdate.USER32(00000000), ref: 1001C79E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: LockPropUpdateWindow
                                • String ID: SHE
                                • API String ID: 165959620-2947365353
                                • Opcode ID: 21e405a72cf705807934c4471f6505aaf612a935a217802134ff392a136f5abf
                                • Instruction ID: 7a3979f4e55717f4f8ab17c69277cc3bf6940b2a43d5fdf8dbe088e1ab8e3198
                                • Opcode Fuzzy Hash: 21e405a72cf705807934c4471f6505aaf612a935a217802134ff392a136f5abf
                                • Instruction Fuzzy Hash: 1EF01738206625DBEB98DB21CC88FAA37E8EF40B91F168498F1099B1A1C770D881CF51
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: _ftol
                                • String ID:
                                • API String ID: 2545261903-0
                                • Opcode ID: 54f8a28af38cbc904a6a211d7a6f8c81f12d1385314ea70c361e39c26235b509
                                • Instruction ID: 0b0bc44675ec839da114b02f6054aa0f657a73593dc5a8713aae574027d7ad68
                                • Opcode Fuzzy Hash: 54f8a28af38cbc904a6a211d7a6f8c81f12d1385314ea70c361e39c26235b509
                                • Instruction Fuzzy Hash: DBF1CF71909B61EBE351DF10D89428A7BE4FFC5380FA14A5DF4C1961A1EB31CB96CB82
                                APIs
                                • SelectObject.GDI32(00000000,01050EB8), ref: 100032C0
                                  • Part of subcall function 100042C0: PtInRegion.GDI32(?,00000000,?,00000000,00000000,1002CDA8,1002CDC8,1002CDC8,?,00000000), ref: 100042F8
                                • SelectObject.GDI32(00000000,?), ref: 1000342A
                                • DeleteDC.GDI32(00000000), ref: 10003431
                                • DeleteObject.GDI32(00000000), ref: 10003438
                                • IsWindowVisible.USER32(?), ref: 10003491
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$DeleteSelect$RegionVisibleWindow
                                • String ID:
                                • API String ID: 4027411055-0
                                • Opcode ID: 91ee33ab1b69a359ab367a5ca384a9598f5026615020f2f567bafd236aa3cddf
                                • Instruction ID: b148bc9a0c6a2d913fc867f66123447b75209ee6773f678a23cc705497eb98c2
                                • Opcode Fuzzy Hash: 91ee33ab1b69a359ab367a5ca384a9598f5026615020f2f567bafd236aa3cddf
                                • Instruction Fuzzy Hash: EF915D796006048FE709CF69C8C4C2BB7EAFFC8694B158A2DF85987369DB30E945CB51
                                APIs
                                • OffsetRect.USER32(?,?,?), ref: 10010E51
                                  • Part of subcall function 1000FBF0: SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                  • Part of subcall function 1000FBF0: CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                  • Part of subcall function 1000FBF0: GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                  • Part of subcall function 1000FBF0: SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                  • Part of subcall function 1000FBF0: DeleteObject.GDI32(00000000), ref: 1000FC5A
                                  • Part of subcall function 1000B0C0: CreateSolidBrush.GDI32(?), ref: 1000B0C9
                                  • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B0DD
                                  • Part of subcall function 1000B0C0: PatBlt.GDI32(?,?,00000000,?,10007767,00F00021), ref: 1000B0FB
                                  • Part of subcall function 1000B0C0: SelectObject.GDI32(?,00000000), ref: 1000B103
                                  • Part of subcall function 1000B0C0: DeleteObject.GDI32(00000000), ref: 1000B106
                                • SetBkMode.GDI32(?,00000001), ref: 10010EA8
                                • SelectObject.GDI32(?,?), ref: 10010EBD
                                • SendMessageA.USER32(?,0000002B,00000000,?), ref: 10010F7B
                                • GetPixel.GDI32(?,?,?), ref: 10011008
                                  • Part of subcall function 1000B4C0: 74001530.MSIMG32(?,?,?,?,?,?,1000BFD7,1000BFD7,?,1000BFD7,?,00000000,?,?,1000BFD7,?), ref: 1000B538
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$ClipCreateDeleteRect$74001530BrushMessageModeOffsetPixelSendSolid
                                • String ID:
                                • API String ID: 3401237145-0
                                • Opcode ID: f5c3c6a3893a7df674df041db2b20e0fcbff9e871180a081f6335cb58035cd86
                                • Instruction ID: a69ee935151e19899d8c4b44d90f6d6784ea96e440500a2836e4d15a7f76abeb
                                • Opcode Fuzzy Hash: f5c3c6a3893a7df674df041db2b20e0fcbff9e871180a081f6335cb58035cd86
                                • Instruction Fuzzy Hash: 0981E4B4608340AFE314CB58C882F6BB7E9FB88740F108A1DF99997391D670E945CB62
                                APIs
                                • ??2@YAPAXI@Z.MSVCRT(000002CC,?,?,10027B52,000000FF,10019EEE,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?), ref: 1001A7A0
                                • ??2@YAPAXI@Z.MSVCRT(00000150,?,?,10027B52,000000FF,10019EEE,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?), ref: 1001A7F7
                                • ??2@YAPAXI@Z.MSVCRT(000002F4,?,?,10027B52,000000FF,10019EEE,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?), ref: 1001A852
                                • ??2@YAPAXI@Z.MSVCRT(0000007C,?,?,10027B52,000000FF,10019EEE,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?), ref: 1001A8AA
                                • ??2@YAPAXI@Z.MSVCRT(00000064,?,?,10027B52,000000FF,10019EEE,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?), ref: 1001A902
                                • ??2@YAPAXI@Z.MSVCRT(00000020,?,?,10027B52,000000FF,10019EEE,?,?,?,?,00000000,?,10027AF9,000000FF,10007A0D,?), ref: 1001A95A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??2@
                                • String ID:
                                • API String ID: 1033339047-0
                                • Opcode ID: 2fd3899075fec84021d5f9c17f83d9ec05ac7b7a79fa2950404c67290ba10dc0
                                • Instruction ID: 780453279fc9d404bdb8cca2fd0b2e9d713902c348bdb508de38a8486bde4cdd
                                • Opcode Fuzzy Hash: 2fd3899075fec84021d5f9c17f83d9ec05ac7b7a79fa2950404c67290ba10dc0
                                • Instruction Fuzzy Hash: 2951A1B5A083519BD604DF289C91B1A73D0EB98B60F004A2EF196DB381DB34ED848B93
                                APIs
                                • PtInRect.USER32(0000002C,00000000,00000000), ref: 100164CD
                                • PtInRect.USER32(0000006C,?,?), ref: 10016519
                                • PtInRect.USER32(0000003C,?,?), ref: 1001656D
                                • PtInRect.USER32(0000005C,?,?), ref: 1001659C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect
                                • String ID:
                                • API String ID: 400858303-0
                                • Opcode ID: 8c6a47cf31c48d3af39ec7387fbf4fc412dc478c91933e0ee7674804f5ed87f4
                                • Instruction ID: 88eee75a724b57100442f45c2dc2b334c4b92a05eceda69fcc84a06ca03c096a
                                • Opcode Fuzzy Hash: 8c6a47cf31c48d3af39ec7387fbf4fc412dc478c91933e0ee7674804f5ed87f4
                                • Instruction Fuzzy Hash: 04514C753007069BD714DF69EC84AABB3E9FB88B14F40092DF85A87240DB75F989CB61
                                APIs
                                • ??3@YAXPAX@Z.MSVCRT(00BD2830,?,?,?,1001B7DB,?,?,10025DCF,?,?), ref: 1001C58A
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,1001B7DB,?,?,10025DCF,?,?), ref: 1001C5EB
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,1001B7DB,?,?,10025DCF,?,?), ref: 1001C64E
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,1001B7DB,?,?,10025DCF,?,?), ref: 1001C6AF
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,1001B7DB,?,?,10025DCF,?,?), ref: 1001C712
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@
                                • String ID:
                                • API String ID: 613200358-0
                                • Opcode ID: 276115195efb06a48f5fe9cc15f69497a4a6cd0156965c0c902d25048cb0634b
                                • Instruction ID: 207150d8cd520f2c8076046b94b252afd95317543a8e9ea73a38ad0b49929f05
                                • Opcode Fuzzy Hash: 276115195efb06a48f5fe9cc15f69497a4a6cd0156965c0c902d25048cb0634b
                                • Instruction Fuzzy Hash: 305134B6A0025D8FC714CF4AC894C56B7E1EF886507AAC4AED54A5F622CA31FC86CF44
                                APIs
                                • GetStartupInfoA.KERNEL32(?), ref: 0068807B
                                • GetFileType.KERNEL32(?,?,00000000), ref: 00688126
                                • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00688189
                                • GetFileType.KERNEL32(00000000,?,00000000), ref: 00688197
                                • SetHandleCount.KERNEL32 ref: 006881CE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: FileHandleType$CountInfoStartup
                                • String ID:
                                • API String ID: 1710529072-0
                                • Opcode ID: 8dc5551ba8093a0ed0357bd12463a694037aff8ee9fe50151abef27e8e3689e9
                                • Instruction ID: 9f2edb0c32f6772c3b41a4b9a244ab3964fb7e62e7a3c54befdc0443655592b9
                                • Opcode Fuzzy Hash: 8dc5551ba8093a0ed0357bd12463a694037aff8ee9fe50151abef27e8e3689e9
                                • Instruction Fuzzy Hash: 2C5105316046028FD720BB6CCC8876577E6AB12364FA8476CD4A6973E1DF31D90ADB51
                                APIs
                                • GetCursorPos.USER32(?), ref: 1001EA96
                                • GetWindowRect.USER32(?,?), ref: 1001EAA5
                                • PtInRect.USER32(?,?,?), ref: 1001EABA
                                • KillTimer.USER32(?,00007720), ref: 1001EAD3
                                • InvalidateRect.USER32(?,00000000,00000000), ref: 1001EAE7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$CursorInvalidateKillTimerWindow
                                • String ID:
                                • API String ID: 1204915734-0
                                • Opcode ID: 9ef916551e3afd5be42b82f6000de7f42f9ff66f33c1c6494cbb8683e67b5be9
                                • Instruction ID: 1aaf348c908433e104cd2ce18659ca1b4ce5b612a6fc862c77d7acbc4d0a29e2
                                • Opcode Fuzzy Hash: 9ef916551e3afd5be42b82f6000de7f42f9ff66f33c1c6494cbb8683e67b5be9
                                • Instruction Fuzzy Hash: F40113B9504752AFD710DB28C8C886BB7F9EF49744B10894DF58AC7220D630F945CB61
                                APIs
                                • GetObjectA.GDI32(00000000,00000018,?), ref: 10011285
                                • SelectObject.GDI32(00000000,00000000), ref: 1001129D
                                • 74001530.MSIMG32(?,?,?,00000010,00000010,00000000,00000000,00000000,?,?,00FF01FF,?,?), ref: 100112DB
                                • SelectObject.GDI32(00000000,00000000), ref: 100112E3
                                • DeleteDC.GDI32(00000000), ref: 100112E6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$74001530Delete
                                • String ID:
                                • API String ID: 3014387588-0
                                • Opcode ID: 30058f95b80ec2afb2eca019207f2575a1dc55e2264cb8df5d5b038a1d08b1d2
                                • Instruction ID: fced8d308138b36c133f8264daa482e3f1224d76aacb4f59917f490493d9ace5
                                • Opcode Fuzzy Hash: 30058f95b80ec2afb2eca019207f2575a1dc55e2264cb8df5d5b038a1d08b1d2
                                • Instruction Fuzzy Hash: 954190767402049FD344DB58CC80FAAB3A9EF89360F25855AED04CF351C635EC96CBA1
                                APIs
                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 10021551
                                • SendMessageA.USER32(?,00000112,0000F093,?), ref: 1002158D
                                • IsZoomed.USER32(?), ref: 1002159F
                                • GetSystemMetrics.USER32(00000004), ref: 100215AF
                                • CallWindowProcA.USER32(?,?,000000A1,?,?), ref: 100216B3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@CallMessageMetricsProcSendSystemWindowZoomed
                                • String ID:
                                • API String ID: 3560867145-0
                                • Opcode ID: b294be7c8ffcdc43dd77355312227d240affd950f5218a8cf851ab3ae9a0d9ef
                                • Instruction ID: 6bec9c70b05b0ba5ee56a74e6e33481ab579d1bccf6329b3e51cbdad3a69271d
                                • Opcode Fuzzy Hash: b294be7c8ffcdc43dd77355312227d240affd950f5218a8cf851ab3ae9a0d9ef
                                • Instruction Fuzzy Hash: B441E27A7002119BE710DF94E8C9FDBB399EBA4750F80803AF9099F282C7719C5487A0
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 100108A4
                                • OffsetRect.USER32(?,?,?), ref: 100108BD
                                • GetSystemMetrics.USER32(00000000), ref: 100108CB
                                • GetSystemMetrics.USER32(00000001), ref: 100108D1
                                • CallWindowProcA.USER32(?,?,00000046,?,?), ref: 10010933
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MetricsRectSystemWindow$CallOffsetProc
                                • String ID:
                                • API String ID: 3217627387-0
                                • Opcode ID: 8be756d99e248d4b1e801939b3714eb5480deeaa81697c236dc379206ebd8c11
                                • Instruction ID: 23580ca9b0729daaad7b279e8dc62797c40a95a429eab73825f66c9b8e763cb3
                                • Opcode Fuzzy Hash: 8be756d99e248d4b1e801939b3714eb5480deeaa81697c236dc379206ebd8c11
                                • Instruction Fuzzy Hash: 9D314C753092069FE718DF18C8A4E6AB7E6FF88740F24851DF9CA8B252D670E981CB51
                                APIs
                                • KillTimer.USER32(?,?), ref: 10016363
                                  • Part of subcall function 100124D0: SetTimer.USER32(?,?,00000000,10012490), ref: 100124E3
                                • GetParent.USER32(?), ref: 100163A2
                                • SendMessageA.USER32(00000000), ref: 100163A9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Timer$KillMessageParentSend
                                • String ID:
                                • API String ID: 4215942989-0
                                • Opcode ID: 929a81d9524b9661685c560c274d4be5b9dbd8275d2883391fbb45ab76854343
                                • Instruction ID: cfa475f0d94ce1742ae4734d9acbaaceee74d3da44fb01cfd7150537f1731013
                                • Opcode Fuzzy Hash: 929a81d9524b9661685c560c274d4be5b9dbd8275d2883391fbb45ab76854343
                                • Instruction Fuzzy Hash: D9216F79301B12ABE624D764CC95FDB72E9EB58B40F404818F656CE280DA76ED82C754
                                APIs
                                • IsWindowVisible.USER32(?), ref: 006985B2
                                • GetWindow.USER32(?,00000005), ref: 006985D1
                                • GetWindowRect.USER32(00000000,?), ref: 006985DE
                                  • Part of subcall function 0069BD35: ScreenToClient.USER32(?,006985EF), ref: 0069BD49
                                  • Part of subcall function 0069BD35: ScreenToClient.USER32(?,006985F7), ref: 0069BD52
                                • SetWindowPos.USER32(00000000,00000000,?,?,00000000,00000000,00000015,?), ref: 00698609
                                • ScrollWindow.USER32(?,?,?,?,?), ref: 00698623
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$ClientScreen$RectScrollVisible
                                • String ID:
                                • API String ID: 1714389229-0
                                • Opcode ID: 99213fab644e7527df05bace83950077ffb24524de3416b002adda7d145d196b
                                • Instruction ID: b306e1e7845f5516d6cf043b8b33b066bdcf8c99c6522780bf2666af8ca5c32f
                                • Opcode Fuzzy Hash: 99213fab644e7527df05bace83950077ffb24524de3416b002adda7d145d196b
                                • Instruction Fuzzy Hash: B7213831600209AFDF219F54DC48EAF7BBAEF8A710B004929F90597661EB71AD11DB60
                                APIs
                                • GlobalUnlock.KERNEL32(00000000), ref: 00681294
                                • GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 006812BD
                                • GlobalLock.KERNEL32(00000000), ref: 006812E9
                                • #43.ODBC32(?,?,000000FE,?,?,?,?,?,00665A2E,?,00000000,?,?,?,?,?), ref: 0068130C
                                • GlobalUnlock.KERNEL32(00000000), ref: 00681336
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$Unlock$AllocLock
                                • String ID:
                                • API String ID: 2918905081-0
                                • Opcode ID: acd8c322ed648db6743ac70f587849fa94c088596290a053035094b42d7d0736
                                • Instruction ID: ae3c6d18247e20df8c3c37da97d7bb44d7e9fa4e4fe5d0f143b7f310767e4e6d
                                • Opcode Fuzzy Hash: acd8c322ed648db6743ac70f587849fa94c088596290a053035094b42d7d0736
                                • Instruction Fuzzy Hash: CF21293510020AEFCF11EF54D948DAA7BBAFF49310B04C559F9599B661C731E892CF54
                                APIs
                                • GetCursorPos.USER32(00000000), ref: 100200D7
                                • ScreenToClient.USER32(?,00000000), ref: 100200E6
                                • PtInRect.USER32(00000034,00000000,?), ref: 100200FA
                                • TrackMouseEvent.USER32(?,?,?,?,?,?,?,?,1001FFAC,?,?), ref: 10020142
                                • CallWindowProcA.USER32(?,?,00000200,?,?), ref: 1002015F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallClientCursorEventMouseProcRectScreenTrackWindow
                                • String ID:
                                • API String ID: 246821313-0
                                • Opcode ID: 452f02149016ab57f0be7edff06aaeae5fa3b70f219bffea2e1b92ae58be304f
                                • Instruction ID: 3019ab15dc7928b1b202b4615dd38406c76b54fbe59730a3b13cec038340f0e3
                                • Opcode Fuzzy Hash: 452f02149016ab57f0be7edff06aaeae5fa3b70f219bffea2e1b92ae58be304f
                                • Instruction Fuzzy Hash: D4113A79204701EFD314DF14C885A5BB7E9FB88700F504A0DF98683621D770E949CB91
                                APIs
                                • SelectObject.GDI32(00000000,00000000), ref: 1000FC21
                                • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 1000FC3A
                                • GetClipRgn.GDI32(?,00000000), ref: 1000FC44
                                • SelectClipRgn.GDI32(?,00000000), ref: 1000FC53
                                • DeleteObject.GDI32(00000000), ref: 1000FC5A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ClipObjectSelect$CreateDeleteRect
                                • String ID:
                                • API String ID: 4028927186-0
                                • Opcode ID: da83c9e4fb198581466429983a14078e16099fff12b7c695a401a7cb8fb48538
                                • Instruction ID: 8b55c2d16eca8a6de84a41ee3e6a417fb1aae9501b44e532c548ffb84ecac7fc
                                • Opcode Fuzzy Hash: da83c9e4fb198581466429983a14078e16099fff12b7c695a401a7cb8fb48538
                                • Instruction Fuzzy Hash: 5001D379601314AFE3509FA59CC8F26BBECFF48A51F20891EFA86D2250C674A9058B20
                                APIs
                                • GetParent.USER32(?), ref: 10014F03
                                • GetClassLongA.USER32(00000000), ref: 10014F0A
                                • SendMessageA.USER32(?,00000115,00000000,00000000), ref: 10014F30
                                • SendMessageA.USER32(?,00000115,00000001,00000000), ref: 10014F47
                                • CallWindowProcA.USER32(?,?,0000020A,?,?), ref: 10014F6A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSend$CallClassLongParentProcWindow
                                • String ID:
                                • API String ID: 1353622983-0
                                • Opcode ID: cfb1d0e207854fb8dcd69ebbbabeafc674c5207766cd86b1f8a176c5c5f3fc80
                                • Instruction ID: d2383e6da1af4afa3427e5b8932eb01d4800057d420c1cdead8e2e9a0b4738ac
                                • Opcode Fuzzy Hash: cfb1d0e207854fb8dcd69ebbbabeafc674c5207766cd86b1f8a176c5c5f3fc80
                                • Instruction Fuzzy Hash: BE018436214711EFE354DB54CC89FC777A5FB98740F118918F2568B6A4C6B0E882CB50
                                APIs
                                • GetLastError.KERNEL32(00000103,7FFFFFFF,006847BE,006856E7,00000000,?,?,00000000,00000001), ref: 00688242
                                • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 00688250
                                • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 0068829C
                                  • Part of subcall function 00684BB2: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,00688265,00000001,00000074,?,?,00000000,00000001), ref: 00684CA8
                                • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 00688274
                                • GetCurrentThreadId.KERNEL32 ref: 00688285
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ErrorLastValue$AllocCurrentHeapThread
                                • String ID:
                                • API String ID: 2020098873-0
                                • Opcode ID: 4d62f2d06305c769ed8041499cd7e5ec57e17ed5707b0d4609c1b019562bb77b
                                • Instruction ID: e344443b53aef2797988b6e29f632b4ec1885e79cf5261bf9809d15b5b2ff1c7
                                • Opcode Fuzzy Hash: 4d62f2d06305c769ed8041499cd7e5ec57e17ed5707b0d4609c1b019562bb77b
                                • Instruction Fuzzy Hash: 72F09032500B225FE7253B70BC2DA5A3B66EF027727101729FA45972A0CF259A828BD0
                                APIs
                                • CreateSolidBrush.GDI32(?), ref: 1000B0C9
                                • SelectObject.GDI32(?,00000000), ref: 1000B0DD
                                • PatBlt.GDI32(?,?,00000000,?,10007767,00F00021), ref: 1000B0FB
                                • SelectObject.GDI32(?,00000000), ref: 1000B103
                                • DeleteObject.GDI32(00000000), ref: 1000B106
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Object$Select$BrushCreateDeleteSolid
                                • String ID:
                                • API String ID: 1979645813-0
                                • Opcode ID: 8202d082a8d02d7cb35fd4a3e7ed27b63294127b33079cb5fb6f541fec19d876
                                • Instruction ID: 83e1346f7fd50f5c1e27b067344e86bff92973f43accc98672dc9dd08b035da2
                                • Opcode Fuzzy Hash: 8202d082a8d02d7cb35fd4a3e7ed27b63294127b33079cb5fb6f541fec19d876
                                • Instruction Fuzzy Hash: E9F0587A205214AFE200DB65DCC8CBBBBECEBCDA54F10051CF94893200C634AD0A8B72
                                APIs
                                • SetMapMode.GDI32(00000000,00000001), ref: 1000FCA8
                                • SetWindowOrgEx.GDI32(?,00000000,00000000,00000000), ref: 1000FCB7
                                • SetWindowExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000FCC6
                                • SetViewportOrgEx.GDI32(00000000,00000000,00000000,00000000), ref: 1000FCD5
                                • SetViewportExtEx.GDI32(?,00000001,00000001,00000000), ref: 1000FCE4
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ViewportWindow$Mode
                                • String ID:
                                • API String ID: 1998588776-0
                                • Opcode ID: d550d996791e68486d74e7e69cc671b827fb91bbe54977dfd5cc9daaae8f4344
                                • Instruction ID: 19eb1e7a97a7d17af1ec9957c6ac4774e2def1865d773f4b49123eaa02bc8819
                                • Opcode Fuzzy Hash: d550d996791e68486d74e7e69cc671b827fb91bbe54977dfd5cc9daaae8f4344
                                • Instruction Fuzzy Hash: 94F09878391310BBF6749B60CCCAF957765AB48B11F304809FA81AA2D0C6F5A5859B64
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: PropScrollShowVisibleWindow
                                • String ID: SHE
                                • API String ID: 925533089-2947365353
                                • Opcode ID: 29df2c69f6a12156ba3bd4c419ce6b73a943d47a4a0f7b6e38221999c43efb81
                                • Instruction ID: 5d9c8eb271cc9b0f02aa51a35db3e0294c315e2d033d928ddf3a82af3e440562
                                • Opcode Fuzzy Hash: 29df2c69f6a12156ba3bd4c419ce6b73a943d47a4a0f7b6e38221999c43efb81
                                • Instruction Fuzzy Hash: 36617C75304B029FE724CE24D984B5BB7E5FB86395F20CA2DE846CB648E771E885CB50
                                APIs
                                • GetMenuItemInfoA.USER32 ref: 10008E73
                                • CallWindowProcA.USER32(?,?,0000002C,?,?), ref: 10008F42
                                • CallWindowProcA.USER32(?,?,0000002C,?,?), ref: 10008F98
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CallProcWindow$InfoItemMenu
                                • String ID: 0
                                • API String ID: 1396499677-4108050209
                                • Opcode ID: 4e8d0b03f25231fc6dcbf2cc5d41fcfb2e5006d6da9717ac153e70087d0b34e5
                                • Instruction ID: 3a263b56c78cee0a8e23883c6dc5574ccc9387f68b94d4295bca3dd9a186fa29
                                • Opcode Fuzzy Hash: 4e8d0b03f25231fc6dcbf2cc5d41fcfb2e5006d6da9717ac153e70087d0b34e5
                                • Instruction Fuzzy Hash: EC513B793102018FE704CF18C884AA6B7E9FF88394F18856EED488B355D736ED46CBA1
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop
                                • String ID: SHE
                                • API String ID: 257714900-2947365353
                                • Opcode ID: 70a0cc52a7083c0dc236e42b745e6e3c8ddb7900b31ff5634154d4c4bc5afb41
                                • Instruction ID: 2bfca706224cabb067b43e3ba5804daf98d0a1a007aca9f1d630acb475a629e4
                                • Opcode Fuzzy Hash: 70a0cc52a7083c0dc236e42b745e6e3c8ddb7900b31ff5634154d4c4bc5afb41
                                • Instruction Fuzzy Hash: 75417C716047029BF720CA25C980F5BB3E8EB85BD0F10CA1DF94ADA285D771EC868B61
                                APIs
                                • GlobalLock.KERNEL32(FFFFFFB2), ref: 0069B28B
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 0069B2DE
                                • GlobalUnlock.KERNEL32(?), ref: 0069B375
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Global$ByteCharLockMultiUnlockWide
                                • String ID: System
                                • API String ID: 231414890-3470857405
                                • Opcode ID: 2d1cd5e97bdcd2fc6d587ff19535f43d8fade62c8b2e589561c125ea694fa063
                                • Instruction ID: 386c4985cfcff2778f80f4e0675bbf599bb6234c009ee633b014054b4f733e2f
                                • Opcode Fuzzy Hash: 2d1cd5e97bdcd2fc6d587ff19535f43d8fade62c8b2e589561c125ea694fa063
                                • Instruction Fuzzy Hash: BF41C472800219EBCF10DF98D9859FEBBBAFF40714B14C169E815AB684D731AA46CF94
                                APIs
                                • GetMenuCheckMarkDimensions.USER32 ref: 006A00E3
                                • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 006A0192
                                • LoadBitmapA.USER32(00000000,00007FE3), ref: 006A01AA
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
                                • String ID:
                                • API String ID: 2596413745-3916222277
                                • Opcode ID: 34aed2f8f9bbffc86a12e5174039c6735d96cbd4248f58fe07ef438c74446221
                                • Instruction ID: 37970da40117683a90b007761dde4365a792decdcdedaf21664d22549f4c7408
                                • Opcode Fuzzy Hash: 34aed2f8f9bbffc86a12e5174039c6735d96cbd4248f58fe07ef438c74446221
                                • Instruction Fuzzy Hash: 48212572E00219AFEB109BB8DC85BEE7BBAEB45704F0541A6E505EB282D6709E04CF50
                                APIs
                                • #44.ODBC32(?,0000003B,?), ref: 0067F618
                                • #45.ODBC32(?,0000000A,?,0000001E,?), ref: 0067F65D
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0$2
                                • API String ID: 0-3793063076
                                • Opcode ID: 48c24c1751f061434979c89717ab890ea9b6bde46380cab6aee8d0cc97c5e698
                                • Instruction ID: fd32d7eaab3bec0483c8bb60aa0e134b2c857f92d8f85e441c55d83a7c0ee7a3
                                • Opcode Fuzzy Hash: 48c24c1751f061434979c89717ab890ea9b6bde46380cab6aee8d0cc97c5e698
                                • Instruction Fuzzy Hash: 54118E31700604AFDB21DB69C945F9EBBFEAF58B00F10806EF546DB2A1EB60DD418B14
                                APIs
                                • RemovePropA.USER32(?,SHE), ref: 10011FF2
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,10006328), ref: 10012038
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,10006328), ref: 10012051
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE
                                • API String ID: 1378348335-2947365353
                                • Opcode ID: ea02168a8f5deea71d01e7a4b0e4aa03e97b304decad5a25f71ffbf8e252d058
                                • Instruction ID: 3aa8719c9e4c45493a9abc554e870e85d9e8a9d78f5f4f171f35c498cd83d2f1
                                • Opcode Fuzzy Hash: ea02168a8f5deea71d01e7a4b0e4aa03e97b304decad5a25f71ffbf8e252d058
                                • Instruction Fuzzy Hash: 521130B96001119FC714DF19E8C0C56B7E5EFDC25032AC66AE508CB222E631ECC7CB90
                                APIs
                                • IsMenu.USER32(?), ref: 1001C4EB
                                • GetMenuItemInfoA.USER32 ref: 1001C524
                                • SetMenuItemInfoA.USER32(?,?,00000400,?), ref: 1001C561
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Menu$InfoItem
                                • String ID: 0
                                • API String ID: 1040333723-4108050209
                                • Opcode ID: 243637d71311623db6106a7351d464556d75ae7d0fb0a3426c1bbd7d193cda2a
                                • Instruction ID: f8b742696180afde77dc344fc1703784ab48d404007203de0ad804771102cd86
                                • Opcode Fuzzy Hash: 243637d71311623db6106a7351d464556d75ae7d0fb0a3426c1bbd7d193cda2a
                                • Instruction Fuzzy Hash: CA115774204311AFE310CF28C884E6BB7E8EF88794F50891DF999D7690E770E982CB56
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: SHE_H
                                • API String ID: 0-3561289158
                                • Opcode ID: ec69a33f17c807fc65332e5d29f5715ed3d611abf23a5220b33cbc44939167a6
                                • Instruction ID: ed2eb374b2d90629944acc07784bf30b6d56568a33e5823ac3835ed5382d68f0
                                • Opcode Fuzzy Hash: ec69a33f17c807fc65332e5d29f5715ed3d611abf23a5220b33cbc44939167a6
                                • Instruction Fuzzy Hash: 0CF0A031219972ABE7529B28FC84FEB2BD8DF89240F050424F580DA140C324DD8787E5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: SHE_G
                                • API String ID: 0-1157359703
                                • Opcode ID: 4bc4de0adbfbafee8f82ec7b16aaf11f122c791ef9270b2a07ba812af1ae456e
                                • Instruction ID: 717698f055d0c19db96feb0f21cf654685e41ef80d95125d4512f973e7f62a11
                                • Opcode Fuzzy Hash: 4bc4de0adbfbafee8f82ec7b16aaf11f122c791ef9270b2a07ba812af1ae456e
                                • Instruction Fuzzy Hash: 31F0A032219972ABE7529B68EC44BEB2BD8DF89350F0A0424F450CA100C324EE8787A6
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ClassCursorLoadRegister
                                • String ID: 0$ComboLBox
                                • API String ID: 1693014935-848744724
                                • Opcode ID: 28f346c1f4dfbe2856f6f1ab5a9c9bdac0e0dbbb8d7eea49bca441095fb31d7d
                                • Instruction ID: 197b4fdf75a9891b34d05670b40042e82415c0f2dfe413ea69ca17455c6e27b2
                                • Opcode Fuzzy Hash: 28f346c1f4dfbe2856f6f1ab5a9c9bdac0e0dbbb8d7eea49bca441095fb31d7d
                                • Instruction Fuzzy Hash: F501FBB44193619BE300CF18D45464BFFE4EF88754F804A1EF48596260D7B596498BCA
                                APIs
                                • SetPropA.USER32(?,SHE_D,?), ref: 10008C8A
                                • SetPropA.USER32(?,SHE_E,?), ref: 10008CA7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop
                                • String ID: SHE_D$SHE_E
                                • API String ID: 257714900-1595638419
                                • Opcode ID: f51451f89e470c2f28b512993583d5a39172c9183de96b87797a79f144c0ae74
                                • Instruction ID: 49cf2e3ec83171f721d29627037efbf36aadcaff1d07842d891325c5e52def58
                                • Opcode Fuzzy Hash: f51451f89e470c2f28b512993583d5a39172c9183de96b87797a79f144c0ae74
                                • Instruction Fuzzy Hash: 5BF03076241B00ABE634C7A5DCD5FD7A36ADBC4700F00090DB355AB181CBB4B84587A4
                                APIs
                                • GetPropA.USER32(?,SHE_J), ref: 1001BBB2
                                • RemovePropA.USER32(?,SHE_J), ref: 1001BBC2
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Prop$Remove
                                • String ID: SHE_J
                                • API String ID: 722682530-977966314
                                • Opcode ID: 16df7e44346833617413e8d424880a7d35195720ed8bc54dee9827241916062d
                                • Instruction ID: 698ab00d73aecd855d15cbcb811a8036f5f521c7cdad0f36f2d8e36d79ce0730
                                • Opcode Fuzzy Hash: 16df7e44346833617413e8d424880a7d35195720ed8bc54dee9827241916062d
                                • Instruction Fuzzy Hash: D5E06D3520A522EBEB40DBE4ECC4ECA3BD8DF44684F450850F204DB454D374D88287A0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID:
                                • String ID: SHE_I
                                • API String ID: 0-2739127632
                                • Opcode ID: 5653f05df02ec0164a37a22cefba73dc40c74f5dbd4fc65037476540090369b8
                                • Instruction ID: f879918b1ab4c0261feb2549141845b8577b79e0b8aeeddf4ae7b2019ef3aec8
                                • Opcode Fuzzy Hash: 5653f05df02ec0164a37a22cefba73dc40c74f5dbd4fc65037476540090369b8
                                • Instruction Fuzzy Hash: 4DE01A36246932ABE65197A4BC84FCB3B98DF48750F164011F904DA120C734AE8647E5
                                APIs
                                • SetLastError.KERNEL32(00000006,?,00000000,?,00000001), ref: 1002630B
                                • SetLastError.KERNEL32(00000006,?,00000000,?,00000001), ref: 1002632C
                                • SetLastError.KERNEL32(00000009,?,00000000,?,00000001), ref: 10026368
                                • SetLastError.KERNEL32(0000000C,?,00000000,?,00000001), ref: 10026395
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ErrorLast
                                • String ID:
                                • API String ID: 1452528299-0
                                • Opcode ID: c3616aa7b4a34e8de724524b9adc4ac18453dfc774abf1496d12cb01671f6ebc
                                • Instruction ID: b3c434b615bc2635f358bc3621d77ed4a3c5ae3a0f0d1fd31a7ebcab961547c0
                                • Opcode Fuzzy Hash: c3616aa7b4a34e8de724524b9adc4ac18453dfc774abf1496d12cb01671f6ebc
                                • Instruction Fuzzy Hash: F941F774E04109EFDB04DFA8D895ADDBBB1EF4C314F608559E94AAB285D730AA41CFA0
                                APIs
                                  • Part of subcall function 00649B70: IsWindow.USER32(?), ref: 00649B7D
                                • GetDC.USER32(?), ref: 00644687
                                • CreatePen.GDI32(00000000,?,?), ref: 00644745
                                • InvalidateRect.USER32(?,?,00000001,00000000), ref: 00644945
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CreateInvalidateRectWindow
                                • String ID:
                                • API String ID: 2485191128-0
                                • Opcode ID: 9b5b18b4901ac8df413971372b05f9f99e2f4ca338df92a83d02a1969497a1b5
                                • Instruction ID: 75905768e5e55d85a24a285b3c98907c9bd93bfc53c840bae6e5ab27e4640767
                                • Opcode Fuzzy Hash: 9b5b18b4901ac8df413971372b05f9f99e2f4ca338df92a83d02a1969497a1b5
                                • Instruction Fuzzy Hash: A5B11775A00249AFDB14DFA9D981EAEB7BAFF89700F10851DF91A97341DB30E901CB64
                                APIs
                                • midiStreamOpen.WINMM(008BCDE0,008BCE08,00000001,005F37F0,008BCDC4,00030000,?,008BCDC4,?,00000000), ref: 005F31EB
                                • midiStreamProperty.WINMM ref: 005F32D2
                                • midiOutPrepareHeader.WINMM(?,?,00000040,00000001,?,?,008BCDC4,?,00000000), ref: 005F3420
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: midi$Stream$HeaderOpenPrepareProperty
                                • String ID:
                                • API String ID: 2061886437-0
                                • Opcode ID: a0eb6731ddef4e90154cd690d5b3cbabf3f3a4d3ca76729cd5ec9d2184433ee1
                                • Instruction ID: 9a276285eb7dbd23e4867f7f0e157f278cab7e4d85f805224848ed64a0fa5b7a
                                • Opcode Fuzzy Hash: a0eb6731ddef4e90154cd690d5b3cbabf3f3a4d3ca76729cd5ec9d2184433ee1
                                • Instruction Fuzzy Hash: 64A17D752006068FD724DF68D894BBABBF6FB84304F10492DE686C7650EB36FA19CB40
                                APIs
                                • ReadFile.KERNEL32(000001D0,000001D0,00000000,000001D0,00000000,00000000,00000000,00000000), ref: 0068E35A
                                • GetLastError.KERNEL32 ref: 0068E364
                                • ReadFile.KERNEL32(?,?,00000001,000001D0,00000000), ref: 0068E42A
                                • GetLastError.KERNEL32 ref: 0068E434
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ErrorFileLastRead
                                • String ID:
                                • API String ID: 1948546556-0
                                • Opcode ID: 6601a189c9f7a88e7064276027c479884e7b3d0c34fcc59ba5dc1447da852841
                                • Instruction ID: 922d4c2c8695dbd805d3528aeb12171666f5d47e3bba4cb00c0fe932ba7cf85f
                                • Opcode Fuzzy Hash: 6601a189c9f7a88e7064276027c479884e7b3d0c34fcc59ba5dc1447da852841
                                • Instruction Fuzzy Hash: 10510430604385DFDF21AF98C884BED7BF2AF02304F544299E8698B392C376D946CB51
                                APIs
                                • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,?,?), ref: 0068E1B7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: FileWrite
                                • String ID:
                                • API String ID: 3934441357-0
                                • Opcode ID: 60ccd19fe1659425e8ba59bbcadc112e00520cc0948df5979c5417522961c2c2
                                • Instruction ID: fdb6103697a23fdaeaa9929c52e46bbae86b198482fcdc398ccc3880574078ac
                                • Opcode Fuzzy Hash: 60ccd19fe1659425e8ba59bbcadc112e00520cc0948df5979c5417522961c2c2
                                • Instruction Fuzzy Hash: 6A51A271900208EFCF11EFA8C898ADD7BF6FF45340F2486AAE8559B261D731DA41CB60
                                APIs
                                • GetWindowRect.USER32(?,?), ref: 100258B1
                                • OffsetRect.USER32(?,?,?), ref: 100258CA
                                • CreateRoundRectRgn.GDI32(00000005,0000001D,?,?,00000001,00000001), ref: 1002590F
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$CreateOffsetRoundWindow
                                • String ID:
                                • API String ID: 3966507845-0
                                • Opcode ID: cea002b6a8ef21f2cb3a895f42f3fb7a80bcb03468e2dcf9a5a67d2188188a0a
                                • Instruction ID: fd809a4ceb687a9920e0430a40226c629e5b8fbea5758eea80f51bca6e6e67d1
                                • Opcode Fuzzy Hash: cea002b6a8ef21f2cb3a895f42f3fb7a80bcb03468e2dcf9a5a67d2188188a0a
                                • Instruction Fuzzy Hash: EC4161B9214601AFE714DB68D885EABB3E9EBC4700F50C91DF89A87240DA70FD05CBA5
                                APIs
                                  • Part of subcall function 10016440: GetCursorPos.USER32(?), ref: 1001644C
                                  • Part of subcall function 10016440: GetWindowRect.USER32(?,?), ref: 1001645B
                                • PtInRect.USER32(0000002C,76C21B80,?), ref: 10015FAA
                                • PtInRect.USER32(0000003C,?,?), ref: 10015FEA
                                • PtInRect.USER32(0000006C,?,?), ref: 10016016
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$CursorWindow
                                • String ID:
                                • API String ID: 2067259548-0
                                • Opcode ID: e1af6214a6f7562a9d61b136065f3798b9d7b294db994c50de0c6dc41576ed19
                                • Instruction ID: 942b3ee6e408d2d77c3cbed3ca5e98908d906ac42d301ec7afef9c4228c91e15
                                • Opcode Fuzzy Hash: e1af6214a6f7562a9d61b136065f3798b9d7b294db994c50de0c6dc41576ed19
                                • Instruction Fuzzy Hash: EE313C763007029BC714CF65EC809ABF3E8FB84751F45462DE95987600DB36E8498BA1
                                APIs
                                • IsWindowEnabled.USER32(?), ref: 100080F7
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: EnabledWindow
                                • String ID:
                                • API String ID: 1255321416-0
                                • Opcode ID: 7eca8c281a0b202235e49865d5931ba51e94db6309202c9b20545d352822c802
                                • Instruction ID: 37371956b553b68bbaf28cfff257a7f0d6f94ec872bf77a3ed07d6cbcf5e9166
                                • Opcode Fuzzy Hash: 7eca8c281a0b202235e49865d5931ba51e94db6309202c9b20545d352822c802
                                • Instruction Fuzzy Hash: CE11B1772444628BF720D67CE846ACAA3D4FB74390F018D27F59AC7288D628DD878754
                                APIs
                                • GetVersion.KERNEL32 ref: 0068213A
                                  • Part of subcall function 0068841C: HeapCreate.KERNEL32(00000000,00001000,00000000,00682172,00000001), ref: 0068842D
                                  • Part of subcall function 0068841C: HeapDestroy.KERNEL32 ref: 0068846C
                                • GetCommandLineA.KERNEL32 ref: 0068219A
                                • GetStartupInfoA.KERNEL32(?), ref: 006821C5
                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 006821E8
                                  • Part of subcall function 00682241: ExitProcess.KERNEL32 ref: 0068225E
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                • String ID:
                                • API String ID: 2057626494-0
                                • Opcode ID: 4a44793649be9073143b84ce9b5a601a1bb7f6f5b9b684ad2e33f39bc5343519
                                • Instruction ID: 983064e108dea127f016b3a154c98fc4a4ae28b1081c9921edd6b1351cbbfbf2
                                • Opcode Fuzzy Hash: 4a44793649be9073143b84ce9b5a601a1bb7f6f5b9b684ad2e33f39bc5343519
                                • Instruction Fuzzy Hash: 3A21B4B19447069EDB48BFB0DC59A6E7BABEF04700F20422DFA019B2A5DF358800CB54
                                APIs
                                • GetWindowRect.USER32(?,00000001), ref: 10016247
                                • PtInRect.USER32(?,?,?), ref: 10016273
                                • PtInRect.USER32(?,?,?), ref: 1001629F
                                • CallWindowProcA.USER32(?,?,00000084,?,?), ref: 100162BC
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$Window$CallProc
                                • String ID:
                                • API String ID: 2141924492-0
                                • Opcode ID: 42652ddef185d08e1dd2a8195f870a649398aa3ec5a314d83f618bccea3ac0b9
                                • Instruction ID: 6bb5dbdf489e1a6f0cc29fa7beb5d91727bcf99365b1c6db062720247cfdbd6a
                                • Opcode Fuzzy Hash: 42652ddef185d08e1dd2a8195f870a649398aa3ec5a314d83f618bccea3ac0b9
                                • Instruction Fuzzy Hash: 0C218176300B165BE360DAAACCC4E67B3ECFB88A50F40492EF985C7641D635FD598760
                                APIs
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10012579,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 1000E39A
                                • SelectObject.GDI32(?,?), ref: 1000E3AA
                                • DeleteDC.GDI32(?), ref: 1000E3B4
                                • DeleteObject.GDI32(?), ref: 1000E3D1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: DeleteObject$??3@Select
                                • String ID:
                                • API String ID: 3433755800-0
                                • Opcode ID: 659a5a91fa5da59b4b2db8e33fef2b4ce9102b4330a9ee2afd06dbb0d76968bb
                                • Instruction ID: eff67cfb01a4d2600c09c765b352805dfe5dc578d0251df350f47da1601aa07e
                                • Opcode Fuzzy Hash: 659a5a91fa5da59b4b2db8e33fef2b4ce9102b4330a9ee2afd06dbb0d76968bb
                                • Instruction Fuzzy Hash: E3113AB4600642AFE714CF15C8C8E16BBE9FF88380B29C56AE808D7325D771ED41CB90
                                APIs
                                • PtInRect.USER32(00000050,?), ref: 100117CF
                                • PtInRect.USER32(00000060,?), ref: 100117DF
                                • PtInRect.USER32(00000050,?), ref: 100117FC
                                • CallWindowProcA.USER32(?,?,00000200,?,?), ref: 10011838
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$CallProcWindow
                                • String ID:
                                • API String ID: 2854435161-0
                                • Opcode ID: 3ea446e5017dbbd17509b2e94ce09de6277395e8464c5c9cb4b424a2b4c0ace6
                                • Instruction ID: 8c562a3d8ffa91b3488f9b2e3c9223cef3bcf56be9e3598e3ad49312dabcbff5
                                • Opcode Fuzzy Hash: 3ea446e5017dbbd17509b2e94ce09de6277395e8464c5c9cb4b424a2b4c0ace6
                                • Instruction Fuzzy Hash: 17117C75600715AFE328CF16CC88EA777FCEB80B85F10481DF58286651DA31E886CB60
                                APIs
                                • PtInRect.USER32(00000050,?), ref: 10011AD9
                                • PtInRect.USER32(00000060,?), ref: 10011AE9
                                • PtInRect.USER32(00000050,?), ref: 10011AFB
                                • CallWindowProcA.USER32(?,?,00000202,?,?), ref: 10011B37
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$CallProcWindow
                                • String ID:
                                • API String ID: 2854435161-0
                                • Opcode ID: 59ffc7ff1c5213b1cf39a1a4bbb19d144ce8416fa73da0f37271d160e36c8f56
                                • Instruction ID: 8a3aa6fa90d41ed69226067b3e75a7c91dc2c122c79226572cad67fafd763433
                                • Opcode Fuzzy Hash: 59ffc7ff1c5213b1cf39a1a4bbb19d144ce8416fa73da0f37271d160e36c8f56
                                • Instruction Fuzzy Hash: C6014C75605725AFE328CB56DCC8EABBBFCEB84B81B10481EF54286211D731E9858B61
                                APIs
                                • PtInRect.USER32(00000050,?), ref: 10011A49
                                • PtInRect.USER32(00000060,?), ref: 10011A59
                                • PtInRect.USER32(00000050,?), ref: 10011A6B
                                • CallWindowProcA.USER32(?,?,00000201,?,?), ref: 10011AAA
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Rect$CallProcWindow
                                • String ID:
                                • API String ID: 2854435161-0
                                • Opcode ID: 81c6700b62b5b93b1d102745a9a0f424a562618402be3bbb7fec3a059a690f7a
                                • Instruction ID: e73e578019d50ab50198203406a73d3f958aba72b0e288fd38bf24a79029c17e
                                • Opcode Fuzzy Hash: 81c6700b62b5b93b1d102745a9a0f424a562618402be3bbb7fec3a059a690f7a
                                • Instruction Fuzzy Hash: B7018CB5201715AFE324CF56CC88EABBBFCEF84B81F10080DF58286111C631E984CB61
                                APIs
                                • GetTopWindow.USER32(?), ref: 00698398
                                • SendMessageA.USER32(00000000,?,?,?), ref: 006983CE
                                • GetTopWindow.USER32(00000000), ref: 006983DB
                                • GetWindow.USER32(00000000,00000002), ref: 006983F9
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$MessageSend
                                • String ID:
                                • API String ID: 1496643700-0
                                • Opcode ID: 1713fcf902ec59db64e35355d2410e5571df15c4c8a110aa3cf11ded05c3e38a
                                • Instruction ID: 1e4bcbd0d37d51aaac44840a059c4515e77b648c94812a11571ef67a3a5cf059
                                • Opcode Fuzzy Hash: 1713fcf902ec59db64e35355d2410e5571df15c4c8a110aa3cf11ded05c3e38a
                                • Instruction Fuzzy Hash: 8A01D03200122AFBCF126F919C04EDF3A2BAF56B90F058015FA1166560CB36C922EBA5
                                APIs
                                • VariantClear.OLEAUT32(?), ref: 0067C567
                                • lstrlenA.KERNEL32(00000000,?,0065FDFE,?,008E4EC8,?), ref: 0067C580
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000001,?,0065FDFE,?,008E4EC8,?), ref: 0067C5A4
                                • SysAllocString.OLEAUT32(00000000), ref: 0067C5AE
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: AllocByteCharClearMultiStringVariantWidelstrlen
                                • String ID:
                                • API String ID: 3257503732-0
                                • Opcode ID: f09f0e3b6828a91a86d8e2162a6b563331c787672dd4cbac50e1d99521336906
                                • Instruction ID: 4fb51fb5ddbefaa4c186af4e6a4358799b858e920a613bf70d19ec14a0465ec2
                                • Opcode Fuzzy Hash: f09f0e3b6828a91a86d8e2162a6b563331c787672dd4cbac50e1d99521336906
                                • Instruction Fuzzy Hash: B601ADB2500225AFEB10AF69CC858AB7BADEF4A770310452AF811D3310E771AE408BB0
                                APIs
                                • KillTimer.USER32(?,00006622,00000000,?,10008828,?,?,?), ref: 10015C04
                                • KillTimer.USER32(?,00006623), ref: 10015C0F
                                • KillTimer.USER32(?,00006624), ref: 10015C1A
                                • CallWindowProcA.USER32(?,?,?,?,?), ref: 10015C60
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: KillTimer$CallProcWindow
                                • String ID:
                                • API String ID: 4157066807-0
                                • Opcode ID: 73276a6097d022647674bceacd34be44969d3857d0e8de3a6d1c863b984271ce
                                • Instruction ID: 7c6a0bc5b88cb8bece1b2373cc4b17ef2a87975b470b42242de656e3c344c917
                                • Opcode Fuzzy Hash: 73276a6097d022647674bceacd34be44969d3857d0e8de3a6d1c863b984271ce
                                • Instruction Fuzzy Hash: 3901E975204B05EBE224DB6AC890F9BB3E9EF98700F14890DF5599F290C676E8818B50
                                APIs
                                • VariantClear.OLEAUT32(?), ref: 0067C4F5
                                • lstrlenA.KERNEL32(00000000,?,?,0065F296,?), ref: 0067C50F
                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000001,?,?,0065F296,?), ref: 0067C535
                                • SysAllocString.OLEAUT32 ref: 0067C53C
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: AllocByteCharClearMultiStringVariantWidelstrlen
                                • String ID:
                                • API String ID: 3257503732-0
                                • Opcode ID: 59b87241f7efca7e41127c5bf1239c92cbdd1996c97f3ccb83085f28b532e4ab
                                • Instruction ID: ad5c9ae01f8ed1e8e8e0d8254cd4fdce21aabd4dcc4ec231e92c01db8078e903
                                • Opcode Fuzzy Hash: 59b87241f7efca7e41127c5bf1239c92cbdd1996c97f3ccb83085f28b532e4ab
                                • Instruction Fuzzy Hash: 96012D71500205BBDB006F65DC45A6BBBAEFF46371F108125F814C2210D771A964CBA1
                                APIs
                                • IsWindowVisible.USER32 ref: 10014AE1
                                • SendMessageA.USER32(?,000000E9,00000000), ref: 10014AF1
                                • IsWindowVisible.USER32(?), ref: 10014B15
                                • SendMessageA.USER32(?,000000E9,00000000), ref: 10014B25
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessageSendVisibleWindow
                                • String ID:
                                • API String ID: 3984873885-0
                                • Opcode ID: 5673385011df388f717717f68ae525e54092af11df8779ffd9ee95a29302be15
                                • Instruction ID: fc90fe054d96e1b13d9ec6b26fe80a5f78d3395466cc4f4aa367405a843ec8f6
                                • Opcode Fuzzy Hash: 5673385011df388f717717f68ae525e54092af11df8779ffd9ee95a29302be15
                                • Instruction Fuzzy Hash: 0D014F79104A12DFE660DB64CC84FE373E8EB18300F018919F6A6C7660C770E845CB64
                                APIs
                                • GetCursorPos.USER32(?), ref: 100205FB
                                • ScreenToClient.USER32(?,?), ref: 1002060A
                                • PtInRect.USER32(00000034,?,?), ref: 1002061E
                                • CallWindowProcA.USER32(?,?,00000201,?,?), ref: 1002064D
                                  • Part of subcall function 100201A0: GetWindowRect.USER32(?,00000020), ref: 100201C0
                                  • Part of subcall function 100201A0: OffsetRect.USER32(00000020,00000000,?), ref: 100201D2
                                  • Part of subcall function 100201A0: SelectObject.GDI32(00000000,00000000), ref: 100201FC
                                  • Part of subcall function 100201A0: SelectObject.GDI32(00000000,?), ref: 1002020B
                                  • Part of subcall function 100201A0: PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1002021F
                                  • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002024C
                                  • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002028A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Rect$EnabledObjectSelect$CallClientCursorOffsetProcScreen
                                • String ID:
                                • API String ID: 2879931018-0
                                • Opcode ID: afb86ea5bd93d0f3c5f6897db7f249f6baaa89d0f154500c220c73288da3c33b
                                • Instruction ID: 9c0e68a1bfba51fb30c42bce227b29f8990f29df3688151d92ec8c3378a25188
                                • Opcode Fuzzy Hash: afb86ea5bd93d0f3c5f6897db7f249f6baaa89d0f154500c220c73288da3c33b
                                • Instruction Fuzzy Hash: C8F019B9210311AFE714DB54CD89D67B3E9FB88B00F50890DF58683650DB70F919CBA1
                                APIs
                                • GetCursorPos.USER32(?), ref: 1002069B
                                • ScreenToClient.USER32(?,?), ref: 100206AA
                                • PtInRect.USER32(00000034,?,?), ref: 100206BE
                                • CallWindowProcA.USER32(?,?,00000203,?,?), ref: 100206ED
                                  • Part of subcall function 100201A0: GetWindowRect.USER32(?,00000020), ref: 100201C0
                                  • Part of subcall function 100201A0: OffsetRect.USER32(00000020,00000000,?), ref: 100201D2
                                  • Part of subcall function 100201A0: SelectObject.GDI32(00000000,00000000), ref: 100201FC
                                  • Part of subcall function 100201A0: SelectObject.GDI32(00000000,?), ref: 1002020B
                                  • Part of subcall function 100201A0: PatBlt.GDI32(00000000,00000000,00000000,?,?,00F00021), ref: 1002021F
                                  • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002024C
                                  • Part of subcall function 100201A0: IsWindowEnabled.USER32(?), ref: 1002028A
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Window$Rect$EnabledObjectSelect$CallClientCursorOffsetProcScreen
                                • String ID:
                                • API String ID: 2879931018-0
                                • Opcode ID: e5acc8b09ba55b0c849634dbc04fec6fda9d79dfec1a49745e8be55ffeea7e36
                                • Instruction ID: 3f66a2042e15db7492eec8571bc4eccf41e5f2ab532cfb3c276876021694c1e2
                                • Opcode Fuzzy Hash: e5acc8b09ba55b0c849634dbc04fec6fda9d79dfec1a49745e8be55ffeea7e36
                                • Instruction Fuzzy Hash: AAF019B9200311AFE204DB54DD89D67B3EDFB88B00F10890DF58683650DB70F909CBA1
                                APIs
                                • __startOneArgErrorHandling.LIBCMT ref: 00682372
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ErrorHandling__start
                                • String ID: pow
                                • API String ID: 3213639722-2276729525
                                • Opcode ID: 2f75cbe8b21e1639d142b73d8d64b0e0c3e3463033a4ed291806de5cb6226932
                                • Instruction ID: 96c05f36496a213b4f9ed9a3c984c2dbc2fe2473e07b21868e4225fc313c5a77
                                • Opcode Fuzzy Hash: 2f75cbe8b21e1639d142b73d8d64b0e0c3e3463033a4ed291806de5cb6226932
                                • Instruction Fuzzy Hash: 05513A709082038BDB11B718C9213FA27D7EB51750F684F6CE4C9823A9EF388CD5AB56
                                APIs
                                  • Part of subcall function 005E0030: GetCurrentThreadId.KERNEL32 ref: 005E0055
                                  • Part of subcall function 005E0030: IsWindow.USER32(00020400), ref: 005E0071
                                  • Part of subcall function 005E0030: SendMessageA.USER32(00020400,000083E7,?,00000000), ref: 005E008A
                                  • Part of subcall function 005E0030: ExitProcess.KERNEL32 ref: 005E009F
                                • DeleteCriticalSection.KERNEL32(008BDAE8,?,?,?,?,?,?,?,?,005E769D), ref: 005DC66A
                                  • Part of subcall function 00697339: __EH_prolog.LIBCMT ref: 0069733E
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: CriticalCurrentDeleteExitH_prologMessageProcessSectionSendThreadWindow
                                • String ID: !$#
                                • API String ID: 2888814780-2504090897
                                • Opcode ID: 0e7295c10222b9fb5b2a98ea1a6cad0f532a86fbfa65784899c74a6b336cf879
                                • Instruction ID: 8e4e8ad66d78a4b78bdc4ce3aa0b006a6b64ceba9c1bc3e180dc9ba64d47af13
                                • Opcode Fuzzy Hash: 0e7295c10222b9fb5b2a98ea1a6cad0f532a86fbfa65784899c74a6b336cf879
                                • Instruction Fuzzy Hash: A39123301087828ED326DFB4D49579ABFE4FFA5344F14484DE8DA47292DBB4924CCBA2
                                APIs
                                • GetCPInfo.KERNEL32(?,00000000), ref: 006875A7
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: Info
                                • String ID: $
                                • API String ID: 1807457897-3032137957
                                • Opcode ID: f555937f37e0552fbab8e2882b7d8dff115431614bffffa2461e996c919bb65b
                                • Instruction ID: 4202b4e6766698b9391ca31a7b136cc79e07998ef3771be85f077af4172191a2
                                • Opcode Fuzzy Hash: f555937f37e0552fbab8e2882b7d8dff115431614bffffa2461e996c919bb65b
                                • Instruction Fuzzy Hash: E5419D3110D2985EEB16A798CC59BFB3F9BEB01704F2415E4E549CB193D271C984DBB2
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: PropVisibleWindow
                                • String ID: SHE
                                • API String ID: 1620322772-2947365353
                                • Opcode ID: bad8104be658c59a684335e1eefddabc784d6684cc733e057d74aa60459c6a08
                                • Instruction ID: 8444408dea7ff7839f6b8436bf1c1fa47ad4da62727e2c49b37074e0dc349d79
                                • Opcode Fuzzy Hash: bad8104be658c59a684335e1eefddabc784d6684cc733e057d74aa60459c6a08
                                • Instruction Fuzzy Hash: 2431B6357046028FE308DE25D984E5BB3E6FFC53D0B158629E445CB259D731EC81C7A1
                                APIs
                                • GetPropA.USER32(?,SHE), ref: 1001BF6B
                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00002237), ref: 1001BFF8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: PropWindow
                                • String ID: SHE
                                • API String ID: 1558329881-2947365353
                                • Opcode ID: 2cdb5b4ba0fe46f17e6190b4a4db435ebc833164ec97df49ba75b8f31de11ba6
                                • Instruction ID: 85ba090588071c15dea8798befb6bd26134b634a8105cef830c30bee5b463931
                                • Opcode Fuzzy Hash: 2cdb5b4ba0fe46f17e6190b4a4db435ebc833164ec97df49ba75b8f31de11ba6
                                • Instruction Fuzzy Hash: 3211F3747066429FE768CF16D859BAA37E2EF85740F1680BCE5498F265D73098828B81
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 10012A31
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027683,000000FF,100129D8), ref: 10012A49
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: f3ff36c292f7d38f49ef2197e5346b7988b11e70b60e7cb463876f272c911453
                                • Instruction ID: 0e30da24780e8a31cd8a941f5683c0ca121a3312a339123d0852e3ec0cd51ef7
                                • Opcode Fuzzy Hash: f3ff36c292f7d38f49ef2197e5346b7988b11e70b60e7cb463876f272c911453
                                • Instruction Fuzzy Hash: BB0100B2500B809FC720CF0EC880A4BFBE8FB58220F900A2DF05587751C778E9888BC2
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 10008291
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,100273B3,000000FF,10008238), ref: 100082A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: ce6b8d6d78edfa3f5972500ae81a72c4b6c8e4efcde3114484507a996ace6328
                                • Instruction ID: 8d0c2f96915b7ab9911d7cedcb7b10105890ee57c753d0c92d78f16e1c7d39c9
                                • Opcode Fuzzy Hash: ce6b8d6d78edfa3f5972500ae81a72c4b6c8e4efcde3114484507a996ace6328
                                • Instruction Fuzzy Hash: D90100B2500B409FC720CF4ECC80A5AFBE8FB58660F900A2DF49583351C778EA488BD1
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 1001D2A1
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027B93,000000FF,1001D248), ref: 1001D2B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: 1833871151e406caf127f19b24a23f9786be65095826091c877ad101a53bada5
                                • Instruction ID: e0b074cf4f92b3f65884162d90763629b618ad9cf82673e82fae43a31723a83f
                                • Opcode Fuzzy Hash: 1833871151e406caf127f19b24a23f9786be65095826091c877ad101a53bada5
                                • Instruction Fuzzy Hash: B701EDB2500B449FC720CF5EC880A5AFBE8FB58220F900A2EF06587351C778E9488BD1
                                APIs
                                  • Part of subcall function 1000CD20: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10007458,?,?,?,?,?,10027373,000000FF,10007408), ref: 1000CD95
                                • RemovePropA.USER32(?,SHE_E), ref: 100092B1
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027443,000000FF,10009258), ref: 100092C9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_E
                                • API String ID: 1378348335-2868218235
                                • Opcode ID: 3eaaf8f3b4fb42674a05c4b62e771ab408c757b91f93078ad7cbc9b3c523134a
                                • Instruction ID: 4a82254dc74f1477473a6a160ec31319b4cd8df32d3868b8b15ac01bce60e4b2
                                • Opcode Fuzzy Hash: 3eaaf8f3b4fb42674a05c4b62e771ab408c757b91f93078ad7cbc9b3c523134a
                                • Instruction Fuzzy Hash: 5A01D2B2500B449FD710CF4EDC80A9AFBE8FB58660F904A2EF05983751C779F9488B91
                                APIs
                                  • Part of subcall function 1000CD20: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10007458,?,?,?,?,?,10027373,000000FF,10007408), ref: 1000CD95
                                • RemovePropA.USER32(?,SHE_E), ref: 1000C361
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,100274C3,000000FF,1000C308), ref: 1000C379
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_E
                                • API String ID: 1378348335-2868218235
                                • Opcode ID: 9e7e7eb8ea5cca787e46e223241693e1a3cb544618ff71b9b3a46ab16fa6dc53
                                • Instruction ID: 0c26b64d7df9c784b094d09015dba98d2bb46ed3e40cb1f0f5a5ad785079c762
                                • Opcode Fuzzy Hash: 9e7e7eb8ea5cca787e46e223241693e1a3cb544618ff71b9b3a46ab16fa6dc53
                                • Instruction Fuzzy Hash: 6001D2B2500B449FD710CF5ED8C0A5AFBE8FB58660F908A2EF05983751C779F9488B92
                                APIs
                                  • Part of subcall function 1000CD20: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10007458,?,?,?,?,?,10027373,000000FF,10007408), ref: 1000CD95
                                • RemovePropA.USER32(?,SHE_E), ref: 10007461
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027373,000000FF,10007408), ref: 10007479
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_E
                                • API String ID: 1378348335-2868218235
                                • Opcode ID: ec716047fd65eb0eccd1595b79ca2fe1785e7679646b1605d2834223fa98ca4e
                                • Instruction ID: e6d9dad6b6dd912bf92acecef5264b8e265586fca7b24c0f8ad47dfeb5240409
                                • Opcode Fuzzy Hash: ec716047fd65eb0eccd1595b79ca2fe1785e7679646b1605d2834223fa98ca4e
                                • Instruction Fuzzy Hash: 840122B2500B449FC710CF0EC880A4AFBE8FB58660F908A2EF45983350C778F9488B91
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 10006491
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027313,000000FF,10006438), ref: 100064A9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: 18bd0f665fc88a98aea10154e4e22eb1fc06547ea1984a2e6176b8e6993260dd
                                • Instruction ID: 05dc49d5b12f37d6491de5426442c1301d529882e0af30903f3f038979945fda
                                • Opcode Fuzzy Hash: 18bd0f665fc88a98aea10154e4e22eb1fc06547ea1984a2e6176b8e6993260dd
                                • Instruction Fuzzy Hash: A601ADB2500B409FD720CF5ECC80A4AFBE8FB58760F904A2DF45587651C779EA488B91
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 10013D41
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027723,000000FF,10013CE8), ref: 10013D59
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: a3b39698868ad8c7d107261a63e3651b997ec77a06157ada41c8f6553e1c346f
                                • Instruction ID: 699a71fb3ecb9e6724347a62b7a2d1e64fb38cbe61c78c588d24fe9252aab333
                                • Opcode Fuzzy Hash: a3b39698868ad8c7d107261a63e3651b997ec77a06157ada41c8f6553e1c346f
                                • Instruction Fuzzy Hash: 060100B2500B409FC720CF0EE880A4AFBF8FB48260F904A2DF05687351C778EA488BC1
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 100115A1
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027603,000000FF,10011548), ref: 100115B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: eba5d9089076f73c4cf66b3081e62dd1230cd1a596af3f71fd889702384bf9b0
                                • Instruction ID: 99b60781cb19179c95cc5a1685a9630f106624611f935e127a3f31f2dea81dd4
                                • Opcode Fuzzy Hash: eba5d9089076f73c4cf66b3081e62dd1230cd1a596af3f71fd889702384bf9b0
                                • Instruction Fuzzy Hash: 2001E1B1500B409FC714CF1EC880A8AFBE8FB48220F900A2DF05687351C778EA488BC1
                                APIs
                                  • Part of subcall function 1000CD20: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10007458,?,?,?,?,?,10027373,000000FF,10007408), ref: 1000CD95
                                • RemovePropA.USER32(?,SHE_E), ref: 10014704
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027786,000000FF,100146A8), ref: 1001471C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_E
                                • API String ID: 1378348335-2868218235
                                • Opcode ID: a1f1971c98501fb8739864ea938d6ac13d53ffdc9c2e9a14246e976696dc74be
                                • Instruction ID: 5b8dc865c417dc958ddeb291251b6182677f2da39e8d14cab1cdba83473914df
                                • Opcode Fuzzy Hash: a1f1971c98501fb8739864ea938d6ac13d53ffdc9c2e9a14246e976696dc74be
                                • Instruction Fuzzy Hash: 3801E1B1500B449FC310CF0DC880A4AFBE8FB48660F904A2DF05987751C779E9488B81
                                APIs
                                  • Part of subcall function 10012540: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,10006488,?,?,?,?,?,10027313,000000FF,10006438), ref: 100125B5
                                • RemovePropA.USER32(?,SHE_D), ref: 10009814
                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10027486,000000FF,100097B8), ref: 1000982C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ??3@$PropRemove
                                • String ID: SHE_D
                                • API String ID: 1378348335-3723672045
                                • Opcode ID: ea3462801c90b1125c2bcb9151d58f5aa8be3e0c25dfc94a5ceebbe1e2969b19
                                • Instruction ID: adf58b0f266f2269a7dbc2d909c93f9f224550e7970bb0ca61c1719deb64407c
                                • Opcode Fuzzy Hash: ea3462801c90b1125c2bcb9151d58f5aa8be3e0c25dfc94a5ceebbe1e2969b19
                                • Instruction Fuzzy Hash: 0601EDB2500B409FC720CF0EC880A4AFBE8FB48620F904A2EF05987351C738FA488BC1
                                APIs
                                • GetPropA.USER32(?,SHE_I), ref: 100120BC
                                • SendMessageA.USER32(?,00000031,?,?), ref: 100120E0
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: MessagePropSend
                                • String ID: SHE_I
                                • API String ID: 25370605-2739127632
                                • Opcode ID: a8e4bd74622fca06d7cadcd8699fe6d8eadf07913165d6e1e37a9601fa529543
                                • Instruction ID: 60dc968c14120ed847476635f92a0f7727cc0b769e9d2866b2aed8ee30803cda
                                • Opcode Fuzzy Hash: a8e4bd74622fca06d7cadcd8699fe6d8eadf07913165d6e1e37a9601fa529543
                                • Instruction Fuzzy Hash: 3AE06D79344653DBE320CB98CD84E5233ECFF88694B114418F509CB210D770EC91CB90
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2729993183.0000000010001000.00000040.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                • Associated: 00000000.00000002.2729980808.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.000000001002C000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010030000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2729993183.0000000010038000.00000040.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730060601.000000001003A000.00000080.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.2730072340.000000001003C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: ParentProp
                                • String ID: SHE
                                • API String ID: 919147419-2947365353
                                • Opcode ID: 41bab890e70a3c0de5d20fd45f7fa028098c1cfb9798b3a15b5c4427c667dfa4
                                • Instruction ID: d2b12472386ee0a5c21a37737c778ad982b9e21b2e97661caa3ee413317f26b3
                                • Opcode Fuzzy Hash: 41bab890e70a3c0de5d20fd45f7fa028098c1cfb9798b3a15b5c4427c667dfa4
                                • Instruction Fuzzy Hash: 43D0A730601559CBE754CB60CDD8935769EDB10340B30425CFA07CA071CB34CAC2D780
                                APIs
                                • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,0068C152,00000000,00000000,00000000,00683A83,00000000,00000000,?,00000000,00000000,00000000), ref: 0068C3B2
                                • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,0068C152,00000000,00000000,00000000,00683A83,00000000,00000000,?,00000000,00000000,00000000), ref: 0068C3E6
                                • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0068C400
                                • HeapFree.KERNEL32(00000000,?), ref: 0068C417
                                Memory Dump Source
                                • Source File: 00000000.00000002.2728816348.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                • Associated: 00000000.00000002.2728796518.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.00000000006AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000076D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729010169.000000000078B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729188588.0000000000893000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729208683.0000000000895000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729227365.0000000000897000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729247124.00000000008A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729265197.00000000008A3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729285190.00000000008A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729297360.00000000008A7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729309751.00000000008AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008B0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.00000000008BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.0000000000907000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729321881.000000000090D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000090F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000091D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.2729378821.000000000092C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_400000_d3r1KVj317.jbxd
                                Similarity
                                • API ID: AllocHeap$FreeVirtual
                                • String ID:
                                • API String ID: 3499195154-0
                                • Opcode ID: 75a3eedbe90c82c188d6ce8852dd5063cd8c9334635904668378316604a21abc
                                • Instruction ID: f014b9703a8f83c6ca6daeae801c824880adf375dd7510280c22a156d300476c
                                • Opcode Fuzzy Hash: 75a3eedbe90c82c188d6ce8852dd5063cd8c9334635904668378316604a21abc
                                • Instruction Fuzzy Hash: F3112B71215201DFEB31AFADEC45965BBB6FB857607104A19F162C71B0C371A882EF10