Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
regsvr.exe

Overview

General Information

Sample name:regsvr.exe
Analysis ID:1591253
MD5:e05f460eb752d40392f1d75d75716276
SHA1:38320c10449e636fab9c7649454b52248957ee1e
SHA256:804465598e1edc091a4ec8844cd7d8c81063ebad37339a1d646e0e0f242c5b89
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Disables the Windows registry editor (regedit)
Disables the Windows task manager (taskmgr)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Sigma detected: Interactive AT Job
Uses schtasks.exe or at.exe to add and modify task schedules
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Entry point lies outside standard sections
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • regsvr.exe (PID: 6508 cmdline: "C:\Users\user\Desktop\regsvr.exe" MD5: E05F460EB752D40392F1D75D75716276)
    • cmd.exe (PID: 5404 cmdline: C:\Windows\system32\cmd.exe /C AT /delete /yes MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • at.exe (PID: 7056 cmdline: AT /delete /yes MD5: 2AE20048111861FA09B709D3CC551AD6)
    • cmd.exe (PID: 2812 cmdline: C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • at.exe (PID: 1812 cmdline: AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe MD5: 2AE20048111861FA09B709D3CC551AD6)
  • regsvr.exe (PID: 3168 cmdline: "C:\Windows\regsvr.exe" MD5: E05F460EB752D40392F1D75D75716276)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community: Data: Command: AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe, CommandLine: AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\at.exe, NewProcessName: C:\Windows\SysWOW64\at.exe, OriginalFileName: C:\Windows\SysWOW64\at.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2812, ParentProcessName: cmd.exe, ProcessCommandLine: AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe, ProcessId: 1812, ProcessName: at.exe
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\system32\regsvr.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\regsvr.exe, ProcessId: 6508, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Msn Messsenger
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-14T20:49:09.661212+010020122001A Network Trojan was detected192.168.2.54970574.6.143.2580TCP
2025-01-14T20:49:10.598364+010020122001A Network Trojan was detected192.168.2.54970674.6.143.25443TCP
2025-01-14T20:49:11.678741+010020122001A Network Trojan was detected192.168.2.54970787.248.119.252443TCP
2025-01-14T20:49:12.843490+010020122001A Network Trojan was detected192.168.2.54970574.6.143.2580TCP
2025-01-14T20:49:13.479647+010020122001A Network Trojan was detected192.168.2.54970874.6.143.25443TCP
2025-01-14T20:49:14.520787+010020122001A Network Trojan was detected192.168.2.54970987.248.119.252443TCP
2025-01-14T20:49:15.186129+010020122001A Network Trojan was detected192.168.2.54971087.248.119.25280TCP
2025-01-14T20:49:16.293240+010020122001A Network Trojan was detected192.168.2.54971287.248.119.252443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-14T20:49:09.661212+010028033043Unknown Traffic192.168.2.54970574.6.143.2580TCP
2025-01-14T20:49:12.843490+010028033043Unknown Traffic192.168.2.54970574.6.143.2580TCP
2025-01-14T20:49:15.186129+010028033043Unknown Traffic192.168.2.54971087.248.119.25280TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: regsvr.exeAvira: detected
Source: C:\Windows\SysWOW64\svchost .exeAvira: detection malicious, Label: TR/AutoIt.CI.14
Source: C:\Windows\SysWOW64\regsvr.exeAvira: detection malicious, Label: TR/AutoIt.CI.14
Source: C:\Users\user\AppData\Roaming\regsvr.exeAvira: detection malicious, Label: TR/AutoIt.CI.14
Source: C:\Windows\SysWOW64\regsvr.exeAvira: detection malicious, Label: TR/AutoIt.CI.14
Source: C:\Users\user\AppData\Roaming\regsvr.exeReversingLabs: Detection: 100%
Source: C:\Windows\SysWOW64\regsvr.exeReversingLabs: Detection: 100%
Source: C:\Windows\SysWOW64\svchost .exeReversingLabs: Detection: 100%
Source: C:\Windows\regsvr.exeReversingLabs: Detection: 100%
Source: regsvr.exeVirustotal: Detection: 97%Perma Link
Source: regsvr.exeReversingLabs: Detection: 100%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: C:\Windows\SysWOW64\svchost .exeJoe Sandbox ML: detected
Source: C:\Windows\SysWOW64\regsvr.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\regsvr.exeJoe Sandbox ML: detected
Source: C:\Windows\SysWOW64\regsvr.exeJoe Sandbox ML: detected
Source: regsvr.exeJoe Sandbox ML: detected
Source: regsvr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 74.6.143.25:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 87.248.119.252:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: C:\Windows\regsvr.exeFile opened: z:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: x:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: v:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: t:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: r:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: p:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: n:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: l:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: j:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: h:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: f:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: b:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: y:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: w:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: u:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: s:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: q:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: o:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: m:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: k:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: i:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: g:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: e:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: c:Jump to behavior
Source: C:\Windows\regsvr.exeFile opened: a:Jump to behavior
Source: regsvr.exe, 00000000.00000003.2156625058.0000000003980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [Autorun]
Source: regsvr.exe, 00000000.00000003.2156677522.0000000003980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [Autorun]
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infp
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.inf
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infC
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infd
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infL
Source: regsvr.exe, 00000009.00000002.4594642657.000000000098E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Autorun]
Source: regsvr.exe, 00000009.00000003.2442670612.0000000003980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [Autorun]
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infS
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.inf
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infP
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infT
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.infv
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.inf@
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.inf:
Source: regsvr.exe, 00000009.00000002.4594873393.0000000002C40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \autorun.inf7
Source: regsvr.exe, 00000009.00000003.2442633872.0000000003980000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: [Autorun]
Source: setup.ini.0.drBinary or memory string: [Autorun]
Source: setup.ini.9.drBinary or memory string: [Autorun]
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040C49D GetFileAttributesW,FindFirstFileW,FindClose,0_2_0040C49D
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040C78E GetFileAttributesW,GetFileAttributesW,_wcscat,GetFileAttributesW,_wcscat,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0040C78E
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041DE3C GetFileAttributesW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0041DE3C
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041E028 FindFirstFileW,FindNextFileW,FindClose,0_2_0041E028
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041B572 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0041B572
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040C672 GetFileAttributesW,_wcscat,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_0040C672
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041EA5E FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_0041EA5E
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041BA0A FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0041BA0A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041BB4D FindFirstFileW,FindClose,0_2_0041BB4D
Source: C:\Windows\regsvr.exeCode function: 9_2_0040C49D GetFileAttributesW,FindFirstFileW,FindClose,9_2_0040C49D
Source: C:\Windows\regsvr.exeCode function: 9_2_0040C78E GetFileAttributesW,GetFileAttributesW,_wcscat,GetFileAttributesW,_wcscat,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,9_2_0040C78E
Source: C:\Windows\regsvr.exeCode function: 9_2_0041DE3C GetFileAttributesW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,9_2_0041DE3C
Source: C:\Windows\regsvr.exeCode function: 9_2_0041E028 FindFirstFileW,FindNextFileW,FindClose,9_2_0041E028
Source: C:\Windows\regsvr.exeCode function: 9_2_0041B572 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_0041B572
Source: C:\Windows\regsvr.exeCode function: 9_2_0040C672 GetFileAttributesW,_wcscat,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,9_2_0040C672
Source: C:\Windows\regsvr.exeCode function: 9_2_0041EA5E FindFirstFileW,Sleep,FindNextFileW,FindClose,9_2_0041EA5E
Source: C:\Windows\regsvr.exeCode function: 9_2_0041BA0A FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,9_2_0041BA0A
Source: C:\Windows\regsvr.exeCode function: 9_2_0041BB4D FindFirstFileW,FindClose,9_2_0041BB4D
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheHost: yahoo.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveHost: www.yahoo.com
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheHost: yahoo.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveHost: www.yahoo.com
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheHost: www.yahoo.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Host: yahoo.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Host: yahoo.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Host: www.yahoo.comCache-Control: no-cache
Source: Joe Sandbox ViewIP Address: 87.248.119.252 87.248.119.252
Source: Joe Sandbox ViewIP Address: 74.6.143.25 74.6.143.25
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49705 -> 74.6.143.25:80
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49705 -> 74.6.143.25:80
Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49710 -> 87.248.119.252:80
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49710 -> 87.248.119.252:80
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49709 -> 87.248.119.252:443
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49712 -> 87.248.119.252:443
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49708 -> 74.6.143.25:443
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49706 -> 74.6.143.25:443
Source: Network trafficSuricata IDS: 2012200 - Severity 1 - ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc : 192.168.2.5:49707 -> 87.248.119.252:443
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00422477 GetLastError,GetLastError,FreeLibrary,FreeLibrary,GetLastError,FreeLibrary,FreeLibrary,GetLastError,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,LoadLibraryA,GetProcAddress,InternetOpenUrlW,GetLastError,FreeLibrary,FreeLibrary,FreeLibrary,GetLastError,FreeLibrary,InternetReadFile,FreeLibrary,0_2_00422477
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheHost: yahoo.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveHost: www.yahoo.com
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheHost: yahoo.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveHost: www.yahoo.com
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Cache-Control: no-cacheHost: www.yahoo.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Host: yahoo.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Host: yahoo.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /setting.doc HTTP/1.1Host: www.yahoo.comCache-Control: no-cache
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: !Locationhttps://www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.0000000000144000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ""https://www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: *.www.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.0000000000144000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: +www.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://www.yahoo.com/setting.docea equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4593705998.0000000000106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Host: www.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Hostwww.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4159152110.000000000013A000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.0000000000131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Hostwww.yahoo.comGET /setting.doc HTTP/1.1 equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4159152110.000000000013A000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.0000000000131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Hostwww.yahoo.comGET /setting.doc HTTP/1.1/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Hostwww.yahoo.comGET /setting.doc HTTP/1.1/setting.docWo equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4159152110.000000000013A000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.0000000000131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Hostwww.yahoo.comGET /setting.doc HTTP/1.1O equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Hostwww.yahoo.comWo equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Location: https://www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Locationhttps://www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000009.00000002.4594813865.0000000002B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/ equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/-e equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc#o equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc/ equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc:l equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/ equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/Sj|f equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/pi equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.doc/ equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.doc?o equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docFllg equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docLlbg equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docPlvg equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docTmzf equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docUo equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/ye equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/{i equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184910391.00000000001A0000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594367032.000000000019C000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: staging.www.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594367032.000000000019C000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174204801.000000000019E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174204801.000000000019E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com/setting.doc.com/setting.docA equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com/yahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com/yahoo.com/setting.docW;-f( equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4593705998.0000000000106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com5 equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.0000000000144000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com7 equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com9 equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comAO equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comDO equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comF equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comLMEM equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comW equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com[O%g equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4593705998.0000000000106000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com` equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comapi.yahoo.com equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174204801.000000000019E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.combO<g equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comcJO equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comg.doccomO equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comg.docdoc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comhO2g equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comlConvertPublicKeyInfo equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comm equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comoO9g equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000002.4594367032.000000000019C000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4157935607.000000000019B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comsO equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174204801.000000000019E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comvO equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comw equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.4158618153.000000000011E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.comyahoo.com/setting.doc equals www.yahoo.com (Yahoo)
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com|O equals www.yahoo.com (Yahoo)
Source: global trafficDNS traffic detected: DNS query: yahoo.com
Source: global trafficDNS traffic detected: DNS query: www.yahoo.com
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000009.00000002.4594813865.0000000002B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/-e
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc#o
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc/
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.yahoo.com/setting.doc:l
Source: regsvr.exe, 00000000.00000002.4594894602.0000000002B95000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000009.00000002.4594813865.0000000002B75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com
Source: regsvr.exe, 00000000.00000002.4593705998.0000000000106000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4159152110.000000000013A000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.0000000000131000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000013B000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.000000000011E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com/setting.doc
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com/setting.doc9
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com/setting.docAO
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com/setting.dochO2g
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com/setting.docl
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.com/setting.docvO
Source: regsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://yahoo.comM
Source: regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ads.taboola.com;
Source: regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.taboola.com
Source: regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://csp.yahoo.com/beacon/csp?src=ats&site=news&region=US&lang=en-US&device=desktop&yrid=6o9nr8ti
Source: regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pnr.ouryahoo.com
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/Sj
Source: regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/pi
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.doc
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.doc/
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.doc?o
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docFllg
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docLlbg
Source: regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docPlvg
Source: regsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docTmzf
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/setting.docUo
Source: regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.yahoo.com/ye
Source: regsvr.exe, 00000000.00000002.4594202461.000000000013F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.000000000013E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
Source: regsvr.exe, 00000000.00000002.4594202461.000000000013F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.000000000013E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/o
Source: regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.000000000011E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174204801.000000000019E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/setting.doc
Source: regsvr.exe, 00000000.00000003.4158618153.000000000011E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/setting.doc(:
Source: regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/setting.docJO
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 74.6.143.25:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 87.248.119.252:443 -> 192.168.2.5:49707 version: TLS 1.2
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0042209A GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0042209A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0042209A GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0042209A
Source: C:\Windows\regsvr.exeCode function: 9_2_0042209A GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,9_2_0042209A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00421EB4 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,DragQueryFileW,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00421EB4
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040853B GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0040853B
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00441FD7 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,LoadCursorW,SetCursor,LoadCursorW,SetCursor,GetWindowRect,GetWindowRect,GetWindowRect,MoveWindow,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,PostMessageW,GetFocus,GetDlgCtrlID,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,SendMessageW,GetCursorPos,GetCursorPos,TrackPopupMenuEx,ClientToScreen,GetSysColor,SetBkColor,74A309A0,ReleaseCapture,SetWindowTextW,SendMessageW,FreeLibrary,DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,0_2_00441FD7
Source: C:\Windows\regsvr.exeCode function: 9_2_00441FD7 GetClientRect,GetCursorPos,ScreenToClient,WindowFromPoint,LoadCursorW,SetCursor,LoadCursorW,SetCursor,GetWindowRect,GetWindowRect,GetWindowRect,MoveWindow,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,PostMessageW,GetFocus,GetDlgCtrlID,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,SendMessageW,GetCursorPos,GetCursorPos,TrackPopupMenuEx,ClientToScreen,GetSysColor,SetBkColor,74A309A0,ReleaseCapture,SetWindowTextW,SendMessageW,FreeLibrary,DragQueryPoint,SendMessageW,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,9_2_00441FD7

System Summary

barindex
Source: regsvr.exeStatic PE information: section name: .vc++
Source: regsvr.exe.0.drStatic PE information: section name: .vc++
Source: regsvr.exe0.0.drStatic PE information: section name: .vc++
Source: svchost .exe.0.drStatic PE information: section name: .vc++
Source: regsvr.exe.9.drStatic PE information: section name: .vc++
Source: regsvr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: regsvr.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: regsvr.exe0.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: svchost .exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: regsvr.exe.9.drStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041D0C8: __swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0041D0C8
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040D288 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,EnumWindows,ExitWindowsEx,SetSystemPowerState,0_2_0040D288
Source: C:\Windows\regsvr.exeCode function: 9_2_0040D288 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,EnumWindows,ExitWindowsEx,SetSystemPowerState,9_2_0040D288
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\28463Jump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\regsvr.exeJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\regsvr.exe:Zone.Identifier:$DATAJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\regsvr.exeJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\regsvr.exe\:Zone.Identifier:$DATAJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\svchost .exeJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\svchost .exe:Zone.Identifier:$DATAJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\setup.iniJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\setting.iniJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0045A04B0_2_0045A04B
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00429FD70_2_00429FD7
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0044602C0_2_0044602C
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004500CD0_2_004500CD
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004121B30_2_004121B3
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0045831B0_2_0045831B
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0044F41A0_2_0044F41A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004504ED0_2_004504ED
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004615730_2_00461573
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0045763A0_2_0045763A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004646BD0_2_004646BD
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004557700_2_00455770
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0044F8ED0_2_0044F8ED
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004459480_2_00445948
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004119060_2_00411906
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0044D99C0_2_0044D99C
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00458AE00_2_00458AE0
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00461AB50_2_00461AB5
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00432BDC0_2_00432BDC
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0044FCC10_2_0044FCC1
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00436CF30_2_00436CF3
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0045BD920_2_0045BD92
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00441FD70_2_00441FD7
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00461FF70_2_00461FF7
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00463FFD0_2_00463FFD
Source: C:\Windows\regsvr.exeCode function: 9_2_0045A04B9_2_0045A04B
Source: C:\Windows\regsvr.exeCode function: 9_2_00429FD79_2_00429FD7
Source: C:\Windows\regsvr.exeCode function: 9_2_0044602C9_2_0044602C
Source: C:\Windows\regsvr.exeCode function: 9_2_004500CD9_2_004500CD
Source: C:\Windows\regsvr.exeCode function: 9_2_004121B39_2_004121B3
Source: C:\Windows\regsvr.exeCode function: 9_2_0045831B9_2_0045831B
Source: C:\Windows\regsvr.exeCode function: 9_2_0044F41A9_2_0044F41A
Source: C:\Windows\regsvr.exeCode function: 9_2_004504ED9_2_004504ED
Source: C:\Windows\regsvr.exeCode function: 9_2_004615739_2_00461573
Source: C:\Windows\regsvr.exeCode function: 9_2_0045763A9_2_0045763A
Source: C:\Windows\regsvr.exeCode function: 9_2_004646BD9_2_004646BD
Source: C:\Windows\regsvr.exeCode function: 9_2_004557709_2_00455770
Source: C:\Windows\regsvr.exeCode function: 9_2_0044F8ED9_2_0044F8ED
Source: C:\Windows\regsvr.exeCode function: 9_2_004459489_2_00445948
Source: C:\Windows\regsvr.exeCode function: 9_2_004119069_2_00411906
Source: C:\Windows\regsvr.exeCode function: 9_2_0044D99C9_2_0044D99C
Source: C:\Windows\regsvr.exeCode function: 9_2_00458AE09_2_00458AE0
Source: C:\Windows\regsvr.exeCode function: 9_2_00461AB59_2_00461AB5
Source: C:\Windows\regsvr.exeCode function: 9_2_00432BDC9_2_00432BDC
Source: C:\Windows\regsvr.exeCode function: 9_2_0044FCC19_2_0044FCC1
Source: C:\Windows\regsvr.exeCode function: 9_2_00436CF39_2_00436CF3
Source: C:\Windows\regsvr.exeCode function: 9_2_0045BD929_2_0045BD92
Source: C:\Windows\regsvr.exeCode function: 9_2_00441FD79_2_00441FD7
Source: C:\Windows\regsvr.exeCode function: 9_2_00461FF79_2_00461FF7
Source: C:\Windows\regsvr.exeCode function: 9_2_00463FFD9_2_00463FFD
Source: C:\Users\user\Desktop\regsvr.exeCode function: String function: 0045570C appears 49 times
Source: C:\Users\user\Desktop\regsvr.exeCode function: String function: 00453ED0 appears 38 times
Source: C:\Users\user\Desktop\regsvr.exeCode function: String function: 0040E30A appears 91 times
Source: C:\Users\user\Desktop\regsvr.exeCode function: String function: 00405AA7 appears 48 times
Source: C:\Windows\regsvr.exeCode function: String function: 0045570C appears 49 times
Source: C:\Windows\regsvr.exeCode function: String function: 00453ED0 appears 38 times
Source: C:\Windows\regsvr.exeCode function: String function: 0040E30A appears 91 times
Source: C:\Windows\regsvr.exeCode function: String function: 00405AA7 appears 48 times
Source: regsvr.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: regsvr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
Source: regsvr.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
Source: regsvr.exe0.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
Source: svchost .exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
Source: regsvr.exe.9.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
Source: regsvr.exeStatic PE information: Section: .rdata ZLIB complexity 1.0009191176470589
Source: regsvr.exe.0.drStatic PE information: Section: .rdata ZLIB complexity 1.0009191176470589
Source: regsvr.exe0.0.drStatic PE information: Section: .rdata ZLIB complexity 1.0009191176470589
Source: svchost .exe.0.drStatic PE information: Section: .rdata ZLIB complexity 1.0009191176470589
Source: regsvr.exe.9.drStatic PE information: Section: .rdata ZLIB complexity 1.0009191176470589
Source: classification engineClassification label: mal100.evad.winEXE@12/13@2/2
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00418B7F GetLastError,FormatMessageW,0_2_00418B7F
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040D288 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,EnumWindows,ExitWindowsEx,SetSystemPowerState,0_2_0040D288
Source: C:\Windows\regsvr.exeCode function: 9_2_0040D288 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,EnumWindows,ExitWindowsEx,SetSystemPowerState,9_2_0040D288
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041C97F SetErrorMode,GetDiskFreeSpaceW,FreeLibrary,0_2_0041C97F
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040BCAA Sleep,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,_wcscat,__wcsicmp,CloseHandle,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,FreeLibrary,0_2_0040BCAA
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041D215 CoInitialize,CoCreateInstance,_wcsncpy,CoUninitialize,0_2_0041D215
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040D70C __swprintf,__swprintf,__wcsicmp,FindResourceW,FindResourceW,LoadResource,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0040D70C
Source: C:\Windows\regsvr.exeFile created: C:\Users\user\AppData\Roaming\supportJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3620:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1400:120:WilError_03
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Users\user\AppData\Local\Temp\aut3295.tmpJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: regsvr.exeVirustotal: Detection: 97%
Source: regsvr.exeReversingLabs: Detection: 100%
Source: C:\Users\user\Desktop\regsvr.exeFile read: C:\Users\user\Desktop\regsvr.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\regsvr.exe "C:\Users\user\Desktop\regsvr.exe"
Source: C:\Users\user\Desktop\regsvr.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C AT /delete /yes
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT /delete /yes
Source: C:\Users\user\Desktop\regsvr.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe
Source: unknownProcess created: C:\Windows\regsvr.exe "C:\Windows\regsvr.exe"
Source: C:\Users\user\Desktop\regsvr.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C AT /delete /yesJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT /delete /yesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exeJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: schedcli.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: schedcli.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\SysWOW64\at.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\regsvr.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\regsvr.exeFile written: C:\Windows\SysWOW64\setup.iniJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004053EF GetVersionExW,_wcscpy,LoadLibraryA,GetProcAddress,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,FreeLibrary,0_2_004053EF
Source: initial sampleStatic PE information: section where entry point is pointing to: .vc++
Source: regsvr.exeStatic PE information: real checksum: 0xc35e7 should be: 0xbe3dd
Source: svchost .exe.0.drStatic PE information: real checksum: 0xc35e7 should be: 0xbe3dd
Source: regsvr.exe.9.drStatic PE information: real checksum: 0xc35e7 should be: 0xbe3dd
Source: regsvr.exe0.0.drStatic PE information: real checksum: 0xc35e7 should be: 0xbe3dd
Source: regsvr.exe.0.drStatic PE information: real checksum: 0xc35e7 should be: 0xbe3dd
Source: regsvr.exeStatic PE information: section name: .vc++
Source: regsvr.exeStatic PE information: section name: .adata
Source: regsvr.exeStatic PE information: section name: .vsp
Source: regsvr.exe.0.drStatic PE information: section name: .vc++
Source: regsvr.exe.0.drStatic PE information: section name: .adata
Source: regsvr.exe.0.drStatic PE information: section name: .vsp
Source: regsvr.exe0.0.drStatic PE information: section name: .vc++
Source: regsvr.exe0.0.drStatic PE information: section name: .adata
Source: regsvr.exe0.0.drStatic PE information: section name: .vsp
Source: svchost .exe.0.drStatic PE information: section name: .vc++
Source: svchost .exe.0.drStatic PE information: section name: .adata
Source: svchost .exe.0.drStatic PE information: section name: .vsp
Source: regsvr.exe.9.drStatic PE information: section name: .vc++
Source: regsvr.exe.9.drStatic PE information: section name: .adata
Source: regsvr.exe.9.drStatic PE information: section name: .vsp
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004A500A push ebp; ret 0_2_004A500D
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00455751 push ecx; ret 0_2_00455764
Source: C:\Windows\regsvr.exeCode function: 9_2_004A500A push ebp; ret 9_2_004A500D
Source: C:\Windows\regsvr.exeCode function: 9_2_00455751 push ecx; ret 9_2_00455764

Persistence and Installation Behavior

barindex
Source: unknownExecutable created and started: C:\Windows\regsvr.exe
Source: C:\Windows\regsvr.exeFile created: C:\Users\user\AppData\Roaming\regsvr.exeJump to dropped file
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\svchost .exeJump to dropped file
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\regsvr.exeJump to dropped file
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\regsvr.exeJump to dropped file
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\svchost .exeJump to dropped file
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\SysWOW64\regsvr.exeJump to dropped file
Source: C:\Users\user\Desktop\regsvr.exeFile created: C:\Windows\regsvr.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Msn MesssengerJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon ShellJump to behavior
Source: C:\Windows\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Msn MesssengerJump to behavior
Source: C:\Windows\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Yahoo MesssengerJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT /delete /yes
Source: C:\Users\user\Desktop\regsvr.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScheduleJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Msn MesssengerJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Msn MesssengerJump to behavior
Source: C:\Windows\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Yahoo MesssengerJump to behavior
Source: C:\Windows\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Yahoo MesssengerJump to behavior
Source: C:\Windows\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Msn MesssengerJump to behavior
Source: C:\Windows\regsvr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Msn MesssengerJump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon (1106).png
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00409786 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00409786
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00439F63 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00439F63
Source: C:\Windows\regsvr.exeCode function: 9_2_00409786 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,9_2_00409786
Source: C:\Windows\regsvr.exeCode function: 9_2_00439F63 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,9_2_00439F63
Source: C:\Users\user\Desktop\regsvr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Windows\regsvr.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_9-52959
Source: C:\Users\user\Desktop\regsvr.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-52879
Source: C:\Users\user\Desktop\regsvr.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-51788
Source: C:\Windows\regsvr.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_9-51906
Source: C:\Users\user\Desktop\regsvr.exeAPI coverage: 7.7 %
Source: C:\Windows\regsvr.exeAPI coverage: 6.7 %
Source: C:\Windows\regsvr.exe TID: 1812Thread sleep count: 209 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040C49D GetFileAttributesW,FindFirstFileW,FindClose,0_2_0040C49D
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040C78E GetFileAttributesW,GetFileAttributesW,_wcscat,GetFileAttributesW,_wcscat,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0040C78E
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041DE3C GetFileAttributesW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0041DE3C
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041E028 FindFirstFileW,FindNextFileW,FindClose,0_2_0041E028
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041B572 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0041B572
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040C672 GetFileAttributesW,_wcscat,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_0040C672
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041EA5E FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_0041EA5E
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041BA0A FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0041BA0A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041BB4D FindFirstFileW,FindClose,0_2_0041BB4D
Source: C:\Windows\regsvr.exeCode function: 9_2_0040C49D GetFileAttributesW,FindFirstFileW,FindClose,9_2_0040C49D
Source: C:\Windows\regsvr.exeCode function: 9_2_0040C78E GetFileAttributesW,GetFileAttributesW,_wcscat,GetFileAttributesW,_wcscat,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,9_2_0040C78E
Source: C:\Windows\regsvr.exeCode function: 9_2_0041DE3C GetFileAttributesW,FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,9_2_0041DE3C
Source: C:\Windows\regsvr.exeCode function: 9_2_0041E028 FindFirstFileW,FindNextFileW,FindClose,9_2_0041E028
Source: C:\Windows\regsvr.exeCode function: 9_2_0041B572 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_0041B572
Source: C:\Windows\regsvr.exeCode function: 9_2_0040C672 GetFileAttributesW,_wcscat,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,9_2_0040C672
Source: C:\Windows\regsvr.exeCode function: 9_2_0041EA5E FindFirstFileW,Sleep,FindNextFileW,FindClose,9_2_0041EA5E
Source: C:\Windows\regsvr.exeCode function: 9_2_0041BA0A FindFirstFileW,SetCurrentDirectoryW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,9_2_0041BA0A
Source: C:\Windows\regsvr.exeCode function: 9_2_0041BB4D FindFirstFileW,FindClose,9_2_0041BB4D
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004053EF GetVersionExW,_wcscpy,LoadLibraryA,GetProcAddress,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,FreeLibrary,0_2_004053EF
Source: regsvr.exe, 00000009.00000002.4594642657.000000000098E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: om&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&00000
Source: regsvr.exe, 00000000.00000002.4594202461.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.0000000000144000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158618153.000000000011E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\regsvr.exeAPI call chain: ExitProcess graph end nodegraph_0-51563
Source: C:\Users\user\Desktop\regsvr.exeAPI call chain: ExitProcess graph end nodegraph_0-51877
Source: C:\Windows\regsvr.exeAPI call chain: ExitProcess graph end nodegraph_9-51581
Source: C:\Windows\regsvr.exeAPI call chain: ExitProcess graph end nodegraph_9-51982
Source: C:\Users\user\Desktop\regsvr.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004053EF GetVersionExW,_wcscpy,LoadLibraryA,GetProcAddress,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,FreeLibrary,0_2_004053EF
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00453C5E GetStartupInfoW,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,___crtGetCommandLineW,___crtGetEnvironmentStringsW,__wsetargv,__amsg_exit,__wsetenvp,__amsg_exit,__cinit,__amsg_exit,__wwincmdln,0_2_00453C5E
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00460147 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00460147
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00460874 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00460874
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0045EA75 SetUnhandledExceptionFilter,0_2_0045EA75
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00454F21 _memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00454F21
Source: C:\Windows\regsvr.exeCode function: 9_2_00460147 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00460147
Source: C:\Windows\regsvr.exeCode function: 9_2_00460874 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00460874
Source: C:\Windows\regsvr.exeCode function: 9_2_0045EA75 SetUnhandledExceptionFilter,9_2_0045EA75
Source: C:\Windows\regsvr.exeCode function: 9_2_00454F21 _memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00454F21
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040108C GetCurrentDirectoryW,MessageBoxA,GetFullPathNameW,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,SetCurrentDirectoryW,0_2_0040108C
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00408381 keybd_event,0_2_00408381
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0040D3AB mouse_event,0_2_0040D3AB
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT /delete /yesJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\at.exe AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exeJump to behavior
Source: regsvr.exeBinary or memory string: Shell_TrayWnd
Source: regsvr.exe, 00000000.00000003.2146840510.0000000000E60000.00000004.00001000.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, regsvr.exe, 00000009.00000003.2441396899.0000000000950000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: k@<v@ASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALT0409000208090710050EASC 0%dupdownonoff0%dShell_TrayWndVirtualAllocExVirtualFreeExExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00461506 cpuid 0_2_00461506
Source: C:\Users\user\Desktop\regsvr.exeCode function: GetLocaleInfoA,0_2_00462EED
Source: C:\Windows\regsvr.exeCode function: GetLocaleInfoA,9_2_00462EED
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0041B7D8 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,_wcsncpy,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0041B7D8
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0042ED72 GetUserNameW,0_2_0042ED72
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0045D8AB __lock,__invoke_watson,__invoke_watson,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,SetOaNoCache,__invoke_watson,0_2_0045D8AB
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_004053EF GetVersionExW,_wcscpy,LoadLibraryA,GetProcAddress,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,FreeLibrary,0_2_004053EF

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\regsvr.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableRegistryToolsJump to behavior
Source: C:\Users\user\Desktop\regsvr.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
Source: regsvr.exeBinary or memory string: WIN_XP
Source: regsvr.exeBinary or memory string: WIN_VISTA
Source: regsvr.exe, 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmpBinary or memory string: %.2d%.3dProgramFilesDirSOFTWARE\Microsoft\Windows\CurrentVersionCommonFilesDirPersonalSOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppDataCommon DesktopDesktopCommon DocumentsCommon FavoritesFavoritesCommon ProgramsProgramsCommon Start MenuStart MenuCommon StartupStartupAppDataX86IA64X64UNKN%dWIN32_NTWIN32_WINDOWSWIN_LONGHORNWIN_VISTAWIN_2003WIN_XPWIN_2000WIN_NT4WIN_95WIN_98WIN_MEInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\Language.DEFAULT\Control Panel\Desktop\ResourceLocale3, 2, 10, 0USERPROFILEUSERDOMAINUSERDNSDOMAINnul:cdeclwinapistdcallnonestrstringwstrwstringintuintlongulongdwordudwordshortushortbyteubytefloatdoubleptrhwndlparamwparamint64uint64long_ptrint_ptrshort_ptrcharwcharuint_ptrulong_ptralignGetProcessMemoryInfoGetProcessIoCountersAdvapi32.dllCreateProcessWithLogonW64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_BINARY+.-.+-diouxXeEfgGsISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINEGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32MonitorFromPointSetLayeredWindowAttributesGetMonitorInfoWAutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DROPID@GUI_DRAGID@GUI_DRAGFILECOMBOBOXEDIT
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_0042754A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0042754A
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00428656 OleInitialize,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_00428656
Source: C:\Users\user\Desktop\regsvr.exeCode function: 0_2_00426F8D socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00426F8D
Source: C:\Windows\regsvr.exeCode function: 9_2_0042754A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,9_2_0042754A
Source: C:\Windows\regsvr.exeCode function: 9_2_00428656 OleInitialize,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,9_2_00428656
Source: C:\Windows\regsvr.exeCode function: 9_2_00426F8D socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,9_2_00426F8D
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Replication Through Removable Media
3
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
2
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
Windows Service
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scheduled Task/Job
1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin Shares3
Clipboard Data
2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron31
Registry Run Keys / Startup Folder
1
Windows Service
1
Software Packing
NTDS3
File and Directory Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
DLL Side-Loading
LSA Secrets25
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Scheduled Task/Job
221
Masquerading
Cached Domain Credentials1
Query Registry
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items31
Registry Run Keys / Startup Folder
1
Virtualization/Sandbox Evasion
DCSync111
Security Software Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc Filesystem1
Virtualization/Sandbox Evasion
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow3
Process Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
Application Window Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
System Owner/User Discovery
Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591253 Sample: regsvr.exe Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 40 yahoo.com 2->40 42 www.yahoo.com 2->42 44 me-ycpi-cf-www.g06.yahoodns.net 2->44 50 Antivirus detection for dropped file 2->50 52 Antivirus / Scanner detection for submitted sample 2->52 54 Multi AV Scanner detection for dropped file 2->54 56 9 other signatures 2->56 8 regsvr.exe 5 22 2->8         started        13 regsvr.exe 1 5 2->13         started        signatures3 process4 dnsIp5 46 me-ycpi-cf-www.g06.yahoodns.net 87.248.119.252, 443, 49707, 49709 YAHOO-DEBDE United Kingdom 8->46 48 yahoo.com 74.6.143.25, 443, 49705, 49706 YAHOO-3US United States 8->48 28 C:\Windows\regsvr.exe, PE32 8->28 dropped 30 C:\Windows\SysWOW64\svchost .exe, PE32 8->30 dropped 32 C:\Windows\SysWOW64\regsvr.exe, PE32 8->32 dropped 38 3 other malicious files 8->38 dropped 58 Creates an undocumented autostart registry key 8->58 60 Creates an autostart registry key pointing to binary in C:\Windows 8->60 62 Disables the Windows task manager (taskmgr) 8->62 64 Disables the Windows registry editor (regedit) 8->64 15 cmd.exe 1 8->15         started        18 cmd.exe 1 8->18         started        34 C:\Users\user\AppData\Roaming\regsvr.exe, PE32 13->34 dropped 36 C:\Users\user\...\regsvr.exe:Zone.Identifier, ASCII 13->36 dropped 66 Multi AV Scanner detection for dropped file 13->66 68 Creates multiple autostart registry keys 13->68 file6 signatures7 process8 signatures9 70 Uses schtasks.exe or at.exe to add and modify task schedules 15->70 20 conhost.exe 15->20         started        22 at.exe 1 15->22         started        24 conhost.exe 18->24         started        26 at.exe 1 18->26         started        process10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
regsvr.exe97%VirustotalBrowse
regsvr.exe100%ReversingLabsWin32.Worm.Sohanad
regsvr.exe100%AviraTR/AutoIt.CI.14
regsvr.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Windows\SysWOW64\svchost .exe100%AviraTR/AutoIt.CI.14
C:\Windows\SysWOW64\regsvr.exe100%AviraTR/AutoIt.CI.14
C:\Users\user\AppData\Roaming\regsvr.exe100%AviraTR/AutoIt.CI.14
C:\Windows\SysWOW64\regsvr.exe100%AviraTR/AutoIt.CI.14
C:\Windows\SysWOW64\svchost .exe100%Joe Sandbox ML
C:\Windows\SysWOW64\regsvr.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\regsvr.exe100%Joe Sandbox ML
C:\Windows\SysWOW64\regsvr.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\regsvr.exe100%ReversingLabsWin32.Worm.Sohanad
C:\Windows\SysWOW64\regsvr.exe100%ReversingLabsWin32.Worm.Sohanad
C:\Windows\SysWOW64\svchost .exe100%ReversingLabsWin32.Worm.Sohanad
C:\Windows\regsvr.exe100%ReversingLabsWin32.Worm.Sohanad
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://yahoo.comM0%Avira URL Cloudsafe
https://pnr.ouryahoo.com0%Avira URL Cloudsafe
https://ads.taboola.com;0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
me-ycpi-cf-www.g06.yahoodns.net
87.248.119.252
truefalse
    high
    yahoo.com
    74.6.143.25
    truefalse
      high
      www.yahoo.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://yahoo.com/setting.docfalse
          high
          http://www.yahoo.com/setting.docfalse
            high
            https://www.yahoo.com/setting.docfalse
              high
              https://yahoo.com/setting.docfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://yahoo.comMregsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.yahoo.com/setting.doc/regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.yahoo.com/setting.docUoregsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://yahoo.comregsvr.exe, 00000000.00000002.4594894602.0000000002B95000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000009.00000002.4594813865.0000000002B75000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.yahoo.com/regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://pnr.ouryahoo.comregsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.yahoo.com/Sjregsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://yahoo.com/setting.dochO2gregsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.yahoo.com/setting.docLlbgregsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.yahoo.com/piregsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://www.yahoo.comregsvr.exe, 00000000.00000002.4594978530.0000000003710000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000009.00000002.4594813865.0000000002B75000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.yahoo.com/setting.docFllgregsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ads.taboola.com;regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://www.yahoo.com/setting.docPlvgregsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://www.yahoo.com/regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://yahoo.com/regsvr.exe, 00000000.00000002.4594202461.000000000013F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.000000000013E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://yahoo.com/setting.doc(:regsvr.exe, 00000000.00000003.4158618153.000000000011E000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4593987312.000000000011F000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://yahoo.com/setting.doclregsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://yahoo.com/setting.docvOregsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.yahoo.com/-eregsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://csp.yahoo.com/beacon/csp?src=ats&site=news&region=US&lang=en-US&device=desktop&yrid=6o9nr8tiregsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.yahoo.com/setting.docTmzfregsvr.exe, 00000000.00000003.2184928553.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2174098834.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://yahoo.com/oregsvr.exe, 00000000.00000002.4594202461.000000000013F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4158062819.000000000013E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://yahoo.com/setting.docJOregsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://yahoo.com/setting.doc9regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.yahoo.com/setting.doc#oregsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.yahoo.com/setting.doc/regsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.yahoo.com/setting.doc:lregsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://cdn.taboola.comregsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.4156480891.0000000000155000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.yahoo.com/yeregsvr.exe, 00000000.00000003.4156480891.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231067722.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2231032889.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000002.4594333616.0000000000161000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://yahoo.com/setting.docAOregsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.yahoo.com/setting.doc?oregsvr.exe, 00000000.00000003.2213312916.000000000015D000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2213352097.000000000015F000.00000004.00000020.00020000.00000000.sdmp, regsvr.exe, 00000000.00000003.2202910400.0000000000161000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          87.248.119.252
                                                                          me-ycpi-cf-www.g06.yahoodns.netUnited Kingdom
                                                                          203220YAHOO-DEBDEfalse
                                                                          74.6.143.25
                                                                          yahoo.comUnited States
                                                                          26101YAHOO-3USfalse
                                                                          Joe Sandbox version:42.0.0 Malachite
                                                                          Analysis ID:1591253
                                                                          Start date and time:2025-01-14 20:48:04 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 8m 24s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:11
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:regsvr.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.evad.winEXE@12/13@2/2
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 97%
                                                                          • Number of executed functions: 72
                                                                          • Number of non-executed functions: 302
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Override analysis time to 240s for sample files taking high CPU consumption
                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53, 4.245.163.56
                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          TimeTypeDescription
                                                                          14:50:12API Interceptor1848x Sleep call for process: regsvr.exe modified
                                                                          20:49:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Msn Messsenger C:\Windows\system32\regsvr.exe
                                                                          20:49:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Msn Messsenger C:\Windows\system32\regsvr.exe
                                                                          20:49:36AutostartRun: WinLogon Shell regsvr.exe
                                                                          20:49:41AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Yahoo Messsenger C:\Users\user\AppData\Roaming\support\svchost.exe
                                                                          20:49:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Yahoo Messsenger C:\Users\user\AppData\Roaming\support\svchost.exe
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          87.248.119.252http://fggddcurrently.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • mail.yahoo.com/
                                                                          https://meandyouj.weebly.com/Get hashmaliciousUnknownBrowse
                                                                          • www.yahoo.com/
                                                                          http://ertyuytcurrently.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • mail.yahoo.com/
                                                                          https://njd.pages.dev/account/js-reporting/?crumb=uz4.07kerli&message=javascript_not_enabled&ref=/account/challenge/passwordGet hashmaliciousHTMLPhisherBrowse
                                                                          • help.yahoo.com/kb/account?redirect=true
                                                                          74.6.143.25Project.exeGet hashmaliciousUnknownBrowse
                                                                          • yahoo.com/
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          me-ycpi-cf-www.g06.yahoodns.nethttps://t.co/WUjzOGRMNxGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          https://att-mail-987654.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • 87.248.119.252
                                                                          http://currently0734.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • 87.248.119.252
                                                                          https://meandyouj.weebly.com/Get hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          https://attservicesinc.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • 87.248.119.252
                                                                          phish_alert_sp2_2.0.0.0.emlGet hashmaliciousPhisherBrowse
                                                                          • 87.248.119.252
                                                                          DocuSign-Docx.pdfGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.251
                                                                          Farahexperiences.com_Report_52288.pdfGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          http://emaildlatt-mailcom-28e2uy93.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • 87.248.119.252
                                                                          27987136e29b3032ad40982c8b7c2e168112c9601e08da806119dcba615524b5.htmlGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          YAHOO-3UShttps://offfryfjtht767755433.webflow.io/Get hashmaliciousUnknownBrowse
                                                                          • 67.195.204.151
                                                                          Update-KB3406-x86.exeGet hashmaliciousUnknownBrowse
                                                                          • 67.195.204.73
                                                                          body.msg.bat.exeGet hashmaliciousUnknownBrowse
                                                                          • 67.195.204.79
                                                                          Update-KB3406-x86.exeGet hashmaliciousUnknownBrowse
                                                                          • 67.195.204.79
                                                                          Update-KB6125-x86.exeGet hashmaliciousUnknownBrowse
                                                                          • 67.195.204.73
                                                                          readme.msg.bat.exeGet hashmaliciousUnknownBrowse
                                                                          • 67.195.204.74
                                                                          Update-KB6125-x86.exeGet hashmaliciousUnknownBrowse
                                                                          • 67.195.204.73
                                                                          mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 98.139.166.53
                                                                          mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                          • 74.6.55.55
                                                                          armv5l.elfGet hashmaliciousMiraiBrowse
                                                                          • 72.30.87.141
                                                                          YAHOO-DEBDEhttp://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          https://microsoft-visio.en.softonic.com/Get hashmaliciousUnknownBrowse
                                                                          • 87.248.119.251
                                                                          https://offfryfjtht767755433.webflow.io/Get hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          https://tinyurl.com/ch268ddpGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          https://urlz.fr/tJIZGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.251
                                                                          http://ww1.tryd.proGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          http://aeromorning.comGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          http://ledger-recovery.co.uk/Get hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          https://ledger-recovery.co.uk/publicGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.251
                                                                          https://talktalk770.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                          • 87.248.119.252
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          37f463bf4616ecd445d4a1937da06e190dsIoO7xjt.docxGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          1KaTo6P18Z.docGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          5UnAIdF7m2.docxGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          x6yDsHJ9tr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
                                                                          • 87.248.119.252
                                                                          • 74.6.143.25
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):300730
                                                                          Entropy (8bit):7.982780278477302
                                                                          Encrypted:false
                                                                          SSDEEP:6144:mnvu6X0EvMzb7nRZHHDSnrsAdTBTGj3g43sLA2mf1I5UhcVf:mvuQ0AMb/U+LgiWA7CUhcVf
                                                                          MD5:05A5C685209891100860BBA7DE6E07BA
                                                                          SHA1:2A2BB52DCCF5CE3C83FF805AD3E185934D78C0CC
                                                                          SHA-256:D2DD6B923203A6366121C6EE663BC52035C25711B44051E87FA7B8E053945EFA
                                                                          SHA-512:E2AF5F4CE12120E662462E85556D34A094F8EDCD25B17E25969DBBD24CBA4821A8FE90B290B8DE8DFE0A480675168EBEC0BB68734D716DA41DECAF8BAFD85060
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06...................(....._..~...!..S9.......W19.D<..T..^............s.~.......ugk....ZX}\.".C.............J.c..( .......X.....@$W\U..S^....... .....t...TmH.A...:.........>0....j.P....|."..u...f..6........@ .(,....S. .]......(0....PQ ...3...`..<...u..x....]...G.......@ ..u..a.X`...f......A....|....\.O......l..I..A........K.W;...0........6... ........U...].a..q..J...t..=.+...Y.cn.E[......FB...b..L/..^.A...%~.....ul_...b..o.B...B=.......b.....t....KW....x.H6&. ..........w.../.....|.."..+.......>.P.......?.m....z> ....P..14i..+T..h...H.lB...}.........!P.@*.....z..|.T......P......*>...Q..Vq4h%.-S..=......R.0...!.......^.V.u\_....`..J.Zg..c.|_..d..c..l2....1.i'....l|P...t.....]#.E.OA....s^.]f..4..D.F1.I$B..M...8......P....b..%..S..:,.....+.../.].F ..X..u.b.L_{.4.010.^V{..cb..e..u.Mzi...b ......8>...........3....}..]"!V.......9P..|..M...?.^.........]7.3.}.0...ss.] v..{.M.`..%....A>....!... .XW. .B0|./..`.Z...o..V.@@g..c.F../5....s.....#.L....?4.q...@.... ...
                                                                          Process:C:\Windows\regsvr.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):300730
                                                                          Entropy (8bit):7.982780278477302
                                                                          Encrypted:false
                                                                          SSDEEP:6144:mnvu6X0EvMzb7nRZHHDSnrsAdTBTGj3g43sLA2mf1I5UhcVf:mvuQ0AMb/U+LgiWA7CUhcVf
                                                                          MD5:05A5C685209891100860BBA7DE6E07BA
                                                                          SHA1:2A2BB52DCCF5CE3C83FF805AD3E185934D78C0CC
                                                                          SHA-256:D2DD6B923203A6366121C6EE663BC52035C25711B44051E87FA7B8E053945EFA
                                                                          SHA-512:E2AF5F4CE12120E662462E85556D34A094F8EDCD25B17E25969DBBD24CBA4821A8FE90B290B8DE8DFE0A480675168EBEC0BB68734D716DA41DECAF8BAFD85060
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06...................(....._..~...!..S9.......W19.D<..T..^............s.~.......ugk....ZX}\.".C.............J.c..( .......X.....@$W\U..S^....... .....t...TmH.A...:.........>0....j.P....|."..u...f..6........@ .(,....S. .]......(0....PQ ...3...`..<...u..x....]...G.......@ ..u..a.X`...f......A....|....\.O......l..I..A........K.W;...0........6... ........U...].a..q..J...t..=.+...Y.cn.E[......FB...b..L/..^.A...%~.....ul_...b..o.B...B=.......b.....t....KW....x.H6&. ..........w.../.....|.."..+.......>.P.......?.m....z> ....P..14i..+T..h...H.lB...}.........!P.@*.....z..|.T......P......*>...Q..Vq4h%.-S..=......R.0...!.......^.V.u\_....`..J.Zg..c.|_..d..c..l2....1.i'....l|P...t.....]#.E.OA....s^.]f..4..D.F1.I$B..M...8......P....b..%..S..:,.....+.../.].F ..X..u.b.L_{.4.010.^V{..cb..e..u.Mzi...b ......8>...........3....}..]"!V.......9P..|..M...?.^.........]7.3.}.0...ss.] v..{.M.`..%....A>....!... .XW. .B0|./..`.Z...o..V.@@g..c.F../5....s.....#.L....?4.q...@.... ...
                                                                          Process:C:\Windows\regsvr.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):765953
                                                                          Entropy (8bit):4.592914551404049
                                                                          Encrypted:false
                                                                          SSDEEP:6144:N3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhsBM7xX:N3TdtLW5WIj1YSSdFxsBSX
                                                                          MD5:E05F460EB752D40392F1D75D75716276
                                                                          SHA1:38320C10449E636FAB9C7649454B52248957EE1E
                                                                          SHA-256:804465598E1EDC091A4EC8844CD7D8C81063EBAD37339A1D646E0E0F242C5B89
                                                                          SHA-512:C7B50835A862C2E681C541DBE3E4AACC1B850896318DAE1E774E554F54B40237815A7352C12F1DBE90057643A8C7E5E547148C75EF6650F82AF948EA819DD1A0
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Avira, Detection: 100%
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 100%
                                                                          Reputation:low
                                                                          Preview:MZ......................@....... ....................................!..L.!This program cannot be run in DOS mode....$........$.qVE."VE."VE."..."TE."q.."bE."q..".E.".J."_E.".J."ME."VE.".D."q.."oE."q.."sE."q.."WE."q.."WE."RichVE."........................PE..L....>IG..........#......R...........P.......p....@..........................P.......5........@.............................._...........^..................T_.......................................................................................text....`..........................@....rdata.......p...D..................@....data........`.......L..............@....rsrc....`...........X..............@....vc++....P...P...J...h.............. ....adata..............................@....vsp................l..4.....9.....`...........................................................................................................................................................................................................................
                                                                          Process:C:\Windows\regsvr.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                          Process:C:\Windows\regsvr.exe
                                                                          File Type:Microsoft Windows Autorun file
                                                                          Category:modified
                                                                          Size (bytes):96
                                                                          Entropy (8bit):4.357433142101641
                                                                          Encrypted:false
                                                                          SSDEEP:3:03BqVurVTWCsLPWTWCsj5d1iuXWiCsnAcv:Sqwr5WViTWVpiuZVv
                                                                          MD5:9ECE103C47335F0CC777F1132B8D522F
                                                                          SHA1:63AFA171C64F86D99DB81723E1335E960E85FA43
                                                                          SHA-256:69815D4932DDDE240CE6B1353305D2FAB58CA402E9C478452C8E37CE8A7B2AC9
                                                                          SHA-512:B1AC64C71C6338BF0AB33DF938128822DA680F20D0552EDB2EDB808F1C75BAFB88467412FC8DC60ED8022A1F0C4F3FCBECB69A320EC871B3A766482F32D6EB05
                                                                          Malicious:false
                                                                          Preview:[Autorun]..Open=regsvr.exe..Shellexecute=regsvr.exe..Shell\Open\command=regsvr.exe..Shell=Open..
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):765953
                                                                          Entropy (8bit):4.592914551404049
                                                                          Encrypted:false
                                                                          SSDEEP:6144:N3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhsBM7xX:N3TdtLW5WIj1YSSdFxsBSX
                                                                          MD5:E05F460EB752D40392F1D75D75716276
                                                                          SHA1:38320C10449E636FAB9C7649454B52248957EE1E
                                                                          SHA-256:804465598E1EDC091A4EC8844CD7D8C81063EBAD37339A1D646E0E0F242C5B89
                                                                          SHA-512:C7B50835A862C2E681C541DBE3E4AACC1B850896318DAE1E774E554F54B40237815A7352C12F1DBE90057643A8C7E5E547148C75EF6650F82AF948EA819DD1A0
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Avira, Detection: 100%
                                                                          • Antivirus: Avira, Detection: 100%
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 100%
                                                                          Preview:MZ......................@....... ....................................!..L.!This program cannot be run in DOS mode....$........$.qVE."VE."VE."..."TE."q.."bE."q..".E.".J."_E.".J."ME."VE.".D."q.."oE."q.."sE."q.."WE."q.."WE."RichVE."........................PE..L....>IG..........#......R...........P.......p....@..........................P.......5........@.............................._...........^..................T_.......................................................................................text....`..........................@....rdata.......p...D..................@....data........`.......L..............@....rsrc....`...........X..............@....vc++....P...P...J...h.............. ....adata..............................@....vsp................l..4.....9.....`...........................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:modified
                                                                          Size (bytes):2
                                                                          Entropy (8bit):1.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:V:V
                                                                          MD5:E0AA021E21DDDBD6D8CECEC71E9CF564
                                                                          SHA1:9CE3BD4224C8C1780DB56B4125ECF3F24BF748B7
                                                                          SHA-256:565339BC4D33D72817B583024112EB7F5CDF3E5EEF0252D6EC1B9C9A94E12BB3
                                                                          SHA-512:900110C951560EFF857B440E89CC29F529416E0E3B3D7F0AD51651BFDBD8025B91768C5ED7DB5352D1A5523354CE06CED2C42047E33A3E958A1BBA5F742DB874
                                                                          Malicious:false
                                                                          Preview:OK
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:Microsoft Windows Autorun file
                                                                          Category:dropped
                                                                          Size (bytes):96
                                                                          Entropy (8bit):4.357433142101641
                                                                          Encrypted:false
                                                                          SSDEEP:3:03BqVurVTWCsLPWTWCsj5d1iuXWiCsnAcv:Sqwr5WViTWVpiuZVv
                                                                          MD5:9ECE103C47335F0CC777F1132B8D522F
                                                                          SHA1:63AFA171C64F86D99DB81723E1335E960E85FA43
                                                                          SHA-256:69815D4932DDDE240CE6B1353305D2FAB58CA402E9C478452C8E37CE8A7B2AC9
                                                                          SHA-512:B1AC64C71C6338BF0AB33DF938128822DA680F20D0552EDB2EDB808F1C75BAFB88467412FC8DC60ED8022A1F0C4F3FCBECB69A320EC871B3A766482F32D6EB05
                                                                          Malicious:false
                                                                          Preview:[Autorun]..Open=regsvr.exe..Shellexecute=regsvr.exe..Shell\Open\command=regsvr.exe..Shell=Open..
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):765953
                                                                          Entropy (8bit):4.592914551404049
                                                                          Encrypted:false
                                                                          SSDEEP:6144:N3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhsBM7xX:N3TdtLW5WIj1YSSdFxsBSX
                                                                          MD5:E05F460EB752D40392F1D75D75716276
                                                                          SHA1:38320C10449E636FAB9C7649454B52248957EE1E
                                                                          SHA-256:804465598E1EDC091A4EC8844CD7D8C81063EBAD37339A1D646E0E0F242C5B89
                                                                          SHA-512:C7B50835A862C2E681C541DBE3E4AACC1B850896318DAE1E774E554F54B40237815A7352C12F1DBE90057643A8C7E5E547148C75EF6650F82AF948EA819DD1A0
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Avira, Detection: 100%
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 100%
                                                                          Preview:MZ......................@....... ....................................!..L.!This program cannot be run in DOS mode....$........$.qVE."VE."VE."..."TE."q.."bE."q..".E.".J."_E.".J."ME."VE.".D."q.."oE."q.."sE."q.."WE."q.."WE."RichVE."........................PE..L....>IG..........#......R...........P.......p....@..........................P.......5........@.............................._...........^..................T_.......................................................................................text....`..........................@....rdata.......p...D..................@....data........`.......L..............@....rsrc....`...........X..............@....vc++....P...P...J...h.............. ....adata..............................@....vsp................l..4.....9.....`...........................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):765953
                                                                          Entropy (8bit):4.592914551404049
                                                                          Encrypted:false
                                                                          SSDEEP:6144:N3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhsBM7xX:N3TdtLW5WIj1YSSdFxsBSX
                                                                          MD5:E05F460EB752D40392F1D75D75716276
                                                                          SHA1:38320C10449E636FAB9C7649454B52248957EE1E
                                                                          SHA-256:804465598E1EDC091A4EC8844CD7D8C81063EBAD37339A1D646E0E0F242C5B89
                                                                          SHA-512:C7B50835A862C2E681C541DBE3E4AACC1B850896318DAE1E774E554F54B40237815A7352C12F1DBE90057643A8C7E5E547148C75EF6650F82AF948EA819DD1A0
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 100%
                                                                          Preview:MZ......................@....... ....................................!..L.!This program cannot be run in DOS mode....$........$.qVE."VE."VE."..."TE."q.."bE."q..".E.".J."_E.".J."ME."VE.".D."q.."oE."q.."sE."q.."WE."q.."WE."RichVE."........................PE..L....>IG..........#......R...........P.......p....@..........................P.......5........@.............................._...........^..................T_.......................................................................................text....`..........................@....rdata.......p...D..................@....data........`.......L..............@....rsrc....`...........X..............@....vc++....P...P...J...h.............. ....adata..............................@....vsp................l..4.....9.....`...........................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\regsvr.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):4.592914551404049
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:regsvr.exe
                                                                          File size:765'953 bytes
                                                                          MD5:e05f460eb752d40392f1d75d75716276
                                                                          SHA1:38320c10449e636fab9c7649454b52248957ee1e
                                                                          SHA256:804465598e1edc091a4ec8844cd7d8c81063ebad37339a1d646e0e0f242c5b89
                                                                          SHA512:c7b50835a862c2e681c541dbe3e4aacc1b850896318dae1e774e554f54b40237815a7352c12f1dbe90057643a8c7e5e547148c75ef6650f82af948ea819dd1a0
                                                                          SSDEEP:6144:N3i8X7pt4Oti0BWmKWIBtOcI9SSbA+cuXhsBM7xX:N3TdtLW5WIj1YSSdFxsBSX
                                                                          TLSH:5AF4D002612BF5E4E82C8C76294730FA1BC56D615E0FEE25705DBF3738762E4AD0A52B
                                                                          File Content Preview:MZ......................@....... ....................................!..L.!This program cannot be run in DOS mode....$........$.qVE."VE."VE."..."TE."q.."bE."q..".E.".J."_E.".J."ME."VE.".D."q.."oE."q.."sE."q.."WE."q.."WE."RichVE.".......................
                                                                          Icon Hash:25ced24e627e1e01
                                                                          Entrypoint:0x4a5000
                                                                          Entrypoint Section:.vc++
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x47493EAA [Sun Nov 25 09:21:46 2007 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:7d580e3bc0d56dc97c988e38179b1756
                                                                          Instruction
                                                                          nop
                                                                          pushad
                                                                          call 00007F3C58D593E8h
                                                                          jmp 00007F3C9E3298D0h
                                                                          push ebp
                                                                          ret
                                                                          call 00007F3C58D593E6h
                                                                          jmp 00007F3C58D5943Fh
                                                                          mov ebx, FFFFFFEDh
                                                                          add ebx, ebp
                                                                          sub ebx, 000A5000h
                                                                          cmp dword ptr [ebp+00000422h], 00000000h
                                                                          mov dword ptr [ebp+00000422h], ebx
                                                                          jne 00007F3C58D5974Bh
                                                                          lea eax, dword ptr [ebp+0000042Eh]
                                                                          push eax
                                                                          call dword ptr [ebp+00000F4Dh]
                                                                          mov dword ptr [ebp+00000426h], eax
                                                                          mov edi, eax
                                                                          lea ebx, dword ptr [ebp+5Eh]
                                                                          push ebx
                                                                          push eax
                                                                          call dword ptr [ebp+00000F49h]
                                                                          mov dword ptr [ebp+0000054Dh], eax
                                                                          lea ebx, dword ptr [ebp+6Bh]
                                                                          push ebx
                                                                          push edi
                                                                          call dword ptr [ebp+00000F49h]
                                                                          mov dword ptr [ebp+00000551h], eax
                                                                          lea eax, dword ptr [ebp+77h]
                                                                          jmp eax
                                                                          push esi
                                                                          imul esi, dword ptr [edx+74h], 416C6175h
                                                                          insb
                                                                          insb
                                                                          outsd
                                                                          arpl word ptr [eax], ax
                                                                          push esi
                                                                          imul esi, dword ptr [edx+74h], 466C6175h
                                                                          jc 00007F3C58D59447h
                                                                          add byte ptr [ebx+0005319Dh], cl
                                                                          add byte ptr [ebx], cl
                                                                          Programming Language:
                                                                          • [C++] VS2005 build 50727
                                                                          • [ C ] VS2005 build 50727
                                                                          • [ASM] VS2005 build 50727
                                                                          • [RES] VS2005 build 50727
                                                                          • [LNK] VS2005 build 50727
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa5fac0x2c8.vc++
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x8f0000x15ed0.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xa5f540x8.vc++
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x100000
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x660000x30400d9d97730b6ccc9fb116199255d493c78False0.9984820272020726data7.998539298621614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rdata0x670000xf0000x440005a7ad5d0679e42057520ca594660a3fFalse1.0009191176470589data7.986857792277237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .data0x760000x190000xc0097fce54178d4c14f5b98ce73426c45f2False0.9879557291666666data7.874420644458337IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0x8f0000x160000x1000bb7bc224d4567eb4333742fbea5652efFalse0.674072265625data6.330193660679065IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .vc++0xa50000x150000x14a00f1b8ac7590e3f4b823bcec760edf4975False0.21271306818181818data5.103013094701391IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .adata0xba0000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .vsp0xbb0000x96dc0x980031e14c04c60244fdc3737cc73a13aacdFalse0.0015419407894736842data0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0xb92c80x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishGreat Britain0.11036585365853659
                                                                          RT_ICON0xb8fe00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.1827956989247312
                                                                          RT_ICON0xb8eb80x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.4222972972972973
                                                                          RT_ICON0xb80100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2867803837953092
                                                                          RT_ICON0xb77680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.35965703971119134
                                                                          RT_ICON0xb70a00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0EnglishGreat Britain0.4216589861751152
                                                                          RT_ICON0xb6b380x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.42846820809248554
                                                                          RT_ICON0xb45900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.2020746887966805
                                                                          RT_ICON0xb34e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.2976078799249531
                                                                          RT_ICON0xb33c00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                          RT_ICON0xb32980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                          RT_ICON0xb29100x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishGreat Britain0.4262295081967213
                                                                          RT_ICON0xb24a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.350177304964539
                                                                          RT_ICON0xaf8000x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 0EnglishGreat Britain0.3191042687193842
                                                                          RT_ICON0xa63580x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 0EnglishGreat Britain0.10074626865671642
                                                                          RT_MENU0xa2b400x40emptyEnglishGreat Britain0
                                                                          RT_DIALOG0xa2b800xf0emptyEnglishGreat Britain0
                                                                          RT_STRING0xa2c700x588emptyEnglishGreat Britain0
                                                                          RT_STRING0xa31f80x690emptyEnglishGreat Britain0
                                                                          RT_STRING0xa38880x4ceemptyEnglishGreat Britain0
                                                                          RT_STRING0xa3d580x604emptyEnglishGreat Britain0
                                                                          RT_STRING0xa435c0x65eemptyEnglishGreat Britain0
                                                                          RT_STRING0xa49bc0x430emptyEnglishGreat Britain0
                                                                          RT_GROUP_ICON0xa629c0xbcdataEnglishGreat Britain0.6223404255319149
                                                                          RT_GROUP_ICON0xa62880x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0xa62740x14dataEnglishGreat Britain1.25
                                                                          DLLImport
                                                                          kernel32.dllGetProcAddress, GetModuleHandleA, LoadLibraryA
                                                                          advapi32.dllRegEnumValueW
                                                                          comctl32.dllImageList_EndDrag
                                                                          comdlg32.dllGetSaveFileNameW
                                                                          gdi32.dllMoveToEx
                                                                          mpr.dllWNetUseConnectionW
                                                                          ole32.dllOleSetContainedObject
                                                                          oleaut32.dllLoadRegTypeLib
                                                                          shell32.dllDragQueryPoint
                                                                          user32.dllGetWindowTextLengthW
                                                                          version.dllGetFileVersionInfoSizeW
                                                                          winmm.dllwaveOutSetVolume
                                                                          wsock32.dll__WSAFDIsSet
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishGreat Britain
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2025-01-14T20:49:09.661212+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.54970574.6.143.2580TCP
                                                                          2025-01-14T20:49:09.661212+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54970574.6.143.2580TCP
                                                                          2025-01-14T20:49:10.598364+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54970674.6.143.25443TCP
                                                                          2025-01-14T20:49:11.678741+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54970787.248.119.252443TCP
                                                                          2025-01-14T20:49:12.843490+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.54970574.6.143.2580TCP
                                                                          2025-01-14T20:49:12.843490+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54970574.6.143.2580TCP
                                                                          2025-01-14T20:49:13.479647+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54970874.6.143.25443TCP
                                                                          2025-01-14T20:49:14.520787+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54970987.248.119.252443TCP
                                                                          2025-01-14T20:49:15.186129+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.54971087.248.119.25280TCP
                                                                          2025-01-14T20:49:15.186129+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54971087.248.119.25280TCP
                                                                          2025-01-14T20:49:16.293240+01002012200ET MALWARE Possible Worm W32.Svich or Other Infection Request for setting.doc1192.168.2.54971287.248.119.252443TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 14, 2025 20:49:09.168083906 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.173027039 CET804970574.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:09.173119068 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.175412893 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.180188894 CET804970574.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:09.661051989 CET804970574.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:09.661211967 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.734637022 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.734685898 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:09.734756947 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.871505976 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:09.871539116 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.372716904 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.372818947 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.480051994 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.480078936 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.480385065 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.480447054 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.483031034 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.527323008 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.598402977 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.598473072 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.598500013 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.598532915 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.598541021 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.598576069 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.601852894 CET49706443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:10.601869106 CET4434970674.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:10.623267889 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:10.623352051 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:10.623433113 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:10.623825073 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:10.623853922 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.376279116 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.376358032 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.377079010 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.377135992 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.383271933 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.383301020 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.383590937 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.383647919 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.384053946 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.427347898 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.678796053 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.679020882 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:11.679106951 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.679107904 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.682960033 CET49707443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:11.682984114 CET4434970787.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:12.730628014 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:12.735402107 CET804970574.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:12.843327999 CET804970574.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:12.843489885 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:12.851675987 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:12.851783037 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:12.851902962 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:12.852379084 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:12.852415085 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.349868059 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.349920988 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.350982904 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.350992918 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.351330996 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.351335049 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.479660034 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.479737997 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.479775906 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.479793072 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.479818106 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.479851007 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.480848074 CET49708443192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:49:13.480865002 CET4434970874.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:13.488673925 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:13.488725901 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:13.488801956 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:13.489131927 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:13.489145994 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.212496996 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.212662935 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.213720083 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.213741064 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.214036942 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.214049101 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.520792007 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.520914078 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.520987034 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.521023035 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.522979021 CET49709443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.523005009 CET4434970987.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.546408892 CET4971080192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.551460028 CET804971087.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:14.551563978 CET4971080192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.551749945 CET4971080192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:14.556554079 CET804971087.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:15.186063051 CET804971087.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:15.186129093 CET4971080192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:15.187129974 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:15.187192917 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:15.187275887 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:15.187540054 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:15.187556982 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:15.920939922 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:15.921080112 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:16.002023935 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:16.002048969 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:16.002289057 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:16.002294064 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:16.293260098 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:16.293401957 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:16.293427944 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:16.293459892 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:16.294964075 CET49712443192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:49:16.294987917 CET4434971287.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:49:23.127676964 CET804970574.6.143.25192.168.2.5
                                                                          Jan 14, 2025 20:49:23.127743006 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:50:46.084965944 CET804971087.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:50:46.087183952 CET4971080192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:50:59.197695017 CET4971080192.168.2.587.248.119.252
                                                                          Jan 14, 2025 20:50:59.197783947 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:50:59.202625036 CET804971087.248.119.252192.168.2.5
                                                                          Jan 14, 2025 20:50:59.541534901 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:51:00.244671106 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:51:01.541603088 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:51:04.041594028 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:51:08.932244062 CET4970580192.168.2.574.6.143.25
                                                                          Jan 14, 2025 20:51:18.541594028 CET4970580192.168.2.574.6.143.25
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 14, 2025 20:49:09.129997015 CET5653753192.168.2.51.1.1.1
                                                                          Jan 14, 2025 20:49:09.136773109 CET53565371.1.1.1192.168.2.5
                                                                          Jan 14, 2025 20:49:10.614804983 CET5248553192.168.2.51.1.1.1
                                                                          Jan 14, 2025 20:49:10.622229099 CET53524851.1.1.1192.168.2.5
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Jan 14, 2025 20:49:09.129997015 CET192.168.2.51.1.1.10xcb0Standard query (0)yahoo.comA (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:10.614804983 CET192.168.2.51.1.1.10x436fStandard query (0)www.yahoo.comA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Jan 14, 2025 20:49:09.136773109 CET1.1.1.1192.168.2.50xcb0No error (0)yahoo.com74.6.143.25A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:09.136773109 CET1.1.1.1192.168.2.50xcb0No error (0)yahoo.com98.137.11.163A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:09.136773109 CET1.1.1.1192.168.2.50xcb0No error (0)yahoo.com74.6.143.26A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:09.136773109 CET1.1.1.1192.168.2.50xcb0No error (0)yahoo.com74.6.231.21A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:09.136773109 CET1.1.1.1192.168.2.50xcb0No error (0)yahoo.com98.137.11.164A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:09.136773109 CET1.1.1.1192.168.2.50xcb0No error (0)yahoo.com74.6.231.20A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:10.622229099 CET1.1.1.1192.168.2.50x436fNo error (0)www.yahoo.comme-ycpi-cf-www.g06.yahoodns.netCNAME (Canonical name)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:10.622229099 CET1.1.1.1192.168.2.50x436fNo error (0)me-ycpi-cf-www.g06.yahoodns.net87.248.119.252A (IP address)IN (0x0001)false
                                                                          Jan 14, 2025 20:49:10.622229099 CET1.1.1.1192.168.2.50x436fNo error (0)me-ycpi-cf-www.g06.yahoodns.net87.248.119.251A (IP address)IN (0x0001)false
                                                                          • yahoo.com
                                                                          • www.yahoo.com
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.54970574.6.143.25806508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Jan 14, 2025 20:49:09.175412893 CET71OUTGET /setting.doc HTTP/1.1
                                                                          Host: yahoo.com
                                                                          Cache-Control: no-cache
                                                                          Jan 14, 2025 20:49:09.661051989 CET287INHTTP/1.1 301 Moved Permanently
                                                                          Date: Tue, 14 Jan 2025 19:49:09 GMT
                                                                          Connection: keep-alive
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          Location: https://yahoo.com/setting.doc
                                                                          Content-Length: 8
                                                                          Data Raw: 72 65 64 69 72 65 63 74
                                                                          Data Ascii: redirect
                                                                          Jan 14, 2025 20:49:12.730628014 CET71OUTGET /setting.doc HTTP/1.1
                                                                          Host: yahoo.com
                                                                          Cache-Control: no-cache
                                                                          Jan 14, 2025 20:49:12.843327999 CET287INHTTP/1.1 301 Moved Permanently
                                                                          Date: Tue, 14 Jan 2025 19:49:12 GMT
                                                                          Connection: keep-alive
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          Location: https://yahoo.com/setting.doc
                                                                          Content-Length: 8
                                                                          Data Raw: 72 65 64 69 72 65 63 74
                                                                          Data Ascii: redirect


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.54971087.248.119.252806508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Jan 14, 2025 20:49:14.551749945 CET75OUTGET /setting.doc HTTP/1.1
                                                                          Host: www.yahoo.com
                                                                          Cache-Control: no-cache
                                                                          Jan 14, 2025 20:49:15.186063051 CET245INHTTP/1.1 301 Moved Permanently
                                                                          Date: Tue, 14 Jan 2025 19:49:15 GMT
                                                                          Connection: keep-alive
                                                                          Server: ATS
                                                                          Cache-Control: no-store
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          Location: https://www.yahoo.com/setting.doc
                                                                          Content-Length: 1
                                                                          Data Raw: 0a
                                                                          Data Ascii:


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.54970674.6.143.254436508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-14 19:49:10 UTC95OUTGET /setting.doc HTTP/1.1
                                                                          Cache-Control: no-cache
                                                                          Host: yahoo.com
                                                                          Connection: Keep-Alive
                                                                          2025-01-14 19:49:10 UTC439INHTTP/1.1 301 Moved Permanently
                                                                          Date: Tue, 14 Jan 2025 19:49:10 GMT
                                                                          Connection: keep-alive
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          Referrer-Policy: no-referrer-when-downgrade
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          Location: https://www.yahoo.com/setting.doc
                                                                          Content-Length: 8
                                                                          2025-01-14 19:49:10 UTC8INData Raw: 72 65 64 69 72 65 63 74
                                                                          Data Ascii: redirect


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.54970787.248.119.2524436508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-14 19:49:11 UTC99OUTGET /setting.doc HTTP/1.1
                                                                          Cache-Control: no-cache
                                                                          Connection: Keep-Alive
                                                                          Host: www.yahoo.com
                                                                          2025-01-14 19:49:11 UTC1200INHTTP/1.1 200 OK
                                                                          Date: Tue, 14 Jan 2025 19:49:11 GMT
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache, max-age=0, private
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          Expires: -1
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-XSS-Protection: 1; mode=block
                                                                          Referrer-Policy: no-referrer-when-downgrade
                                                                          X-Content-Type-Options: nosniff
                                                                          Content-Length: 2
                                                                          Age: 0
                                                                          Connection: close
                                                                          Content-Security-Policy: frame-ancestors 'self' https://*.builtbygirls.com https://*.rivals.com https://*.engadget.com https://*.intheknow.com https://*.autoblog.com https://*.techcrunch.com https://*.yahoo.com https://*.aol.com https://*.huffingtonpost.com https://*.oath.com https://*.search.yahoo.com https://*.pnr.ouryahoo.com https://pnr.ouryahoo.com https://*.search.aol.com https://*.search.huffpost.com https://*.onesearch.com https://*.verizonmedia.com https://*.publishing.oath.com https://cdn.taboola.com https://ads.taboola.com; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-popups-to-escape-sandbox allow-presentation; report-uri https://csp.yahoo.com/beacon/csp?src=ats&site=news&region=US&lang=en-US&device=desktop&yrid=6o9nr8tivmg0j&partner=;
                                                                          2025-01-14 19:49:11 UTC2INData Raw: 4f 4b
                                                                          Data Ascii: OK


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.54970874.6.143.254436508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-14 19:49:13 UTC95OUTGET /setting.doc HTTP/1.1
                                                                          Cache-Control: no-cache
                                                                          Host: yahoo.com
                                                                          Connection: Keep-Alive
                                                                          2025-01-14 19:49:13 UTC439INHTTP/1.1 301 Moved Permanently
                                                                          Date: Tue, 14 Jan 2025 19:49:13 GMT
                                                                          Connection: keep-alive
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          Referrer-Policy: no-referrer-when-downgrade
                                                                          X-Content-Type-Options: nosniff
                                                                          X-XSS-Protection: 1; mode=block
                                                                          Location: https://www.yahoo.com/setting.doc
                                                                          Content-Length: 8
                                                                          2025-01-14 19:49:13 UTC8INData Raw: 72 65 64 69 72 65 63 74
                                                                          Data Ascii: redirect


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.54970987.248.119.2524436508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-14 19:49:14 UTC99OUTGET /setting.doc HTTP/1.1
                                                                          Cache-Control: no-cache
                                                                          Connection: Keep-Alive
                                                                          Host: www.yahoo.com
                                                                          2025-01-14 19:49:14 UTC1200INHTTP/1.1 200 OK
                                                                          Date: Tue, 14 Jan 2025 19:49:14 GMT
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache, max-age=0, private
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          Expires: -1
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-XSS-Protection: 1; mode=block
                                                                          Referrer-Policy: no-referrer-when-downgrade
                                                                          X-Content-Type-Options: nosniff
                                                                          Content-Length: 2
                                                                          Age: 0
                                                                          Connection: close
                                                                          Content-Security-Policy: frame-ancestors 'self' https://*.builtbygirls.com https://*.rivals.com https://*.engadget.com https://*.intheknow.com https://*.autoblog.com https://*.techcrunch.com https://*.yahoo.com https://*.aol.com https://*.huffingtonpost.com https://*.oath.com https://*.search.yahoo.com https://*.pnr.ouryahoo.com https://pnr.ouryahoo.com https://*.search.aol.com https://*.search.huffpost.com https://*.onesearch.com https://*.verizonmedia.com https://*.publishing.oath.com https://cdn.taboola.com https://ads.taboola.com; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-popups-to-escape-sandbox allow-presentation; report-uri https://csp.yahoo.com/beacon/csp?src=ats&site=news&region=US&lang=en-US&device=desktop&yrid=6o9nr8tivmg0j&partner=;
                                                                          2025-01-14 19:49:14 UTC2INData Raw: 4f 4b
                                                                          Data Ascii: OK


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.54971287.248.119.2524436508C:\Users\user\Desktop\regsvr.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-14 19:49:15 UTC99OUTGET /setting.doc HTTP/1.1
                                                                          Cache-Control: no-cache
                                                                          Host: www.yahoo.com
                                                                          Connection: Keep-Alive
                                                                          2025-01-14 19:49:16 UTC1200INHTTP/1.1 200 OK
                                                                          Date: Tue, 14 Jan 2025 19:49:16 GMT
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Server: ATS
                                                                          Cache-Control: no-store, no-cache, max-age=0, private
                                                                          Content-Type: text/html
                                                                          Content-Language: en
                                                                          Expires: -1
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          X-XSS-Protection: 1; mode=block
                                                                          Referrer-Policy: no-referrer-when-downgrade
                                                                          X-Content-Type-Options: nosniff
                                                                          Content-Length: 2
                                                                          Age: 0
                                                                          Connection: close
                                                                          Content-Security-Policy: frame-ancestors 'self' https://*.builtbygirls.com https://*.rivals.com https://*.engadget.com https://*.intheknow.com https://*.autoblog.com https://*.techcrunch.com https://*.yahoo.com https://*.aol.com https://*.huffingtonpost.com https://*.oath.com https://*.search.yahoo.com https://*.pnr.ouryahoo.com https://pnr.ouryahoo.com https://*.search.aol.com https://*.search.huffpost.com https://*.onesearch.com https://*.verizonmedia.com https://*.publishing.oath.com https://cdn.taboola.com https://ads.taboola.com; sandbox allow-forms allow-same-origin allow-scripts allow-popups allow-popups-to-escape-sandbox allow-presentation; report-uri https://csp.yahoo.com/beacon/csp?src=ats&site=news&region=US&lang=en-US&device=desktop&yrid=6o9nr8tivmg0j&partner=;
                                                                          2025-01-14 19:49:16 UTC2INData Raw: 4f 4b
                                                                          Data Ascii: OK


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:14:49:07
                                                                          Start date:14/01/2025
                                                                          Path:C:\Users\user\Desktop\regsvr.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\regsvr.exe"
                                                                          Imagebase:0x400000
                                                                          File size:765'953 bytes
                                                                          MD5 hash:E05F460EB752D40392F1D75D75716276
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Target ID:1
                                                                          Start time:14:49:07
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\system32\cmd.exe /C AT /delete /yes
                                                                          Imagebase:0x790000
                                                                          File size:236'544 bytes
                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:14:49:07
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff6d64d0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:14:49:07
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\SysWOW64\at.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:AT /delete /yes
                                                                          Imagebase:0xc40000
                                                                          File size:25'088 bytes
                                                                          MD5 hash:2AE20048111861FA09B709D3CC551AD6
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:moderate
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:14:49:08
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe
                                                                          Imagebase:0x790000
                                                                          File size:236'544 bytes
                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:6
                                                                          Start time:14:49:08
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff6d64d0000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:7
                                                                          Start time:14:49:08
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\SysWOW64\at.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe
                                                                          Imagebase:0xc40000
                                                                          File size:25'088 bytes
                                                                          MD5 hash:2AE20048111861FA09B709D3CC551AD6
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:moderate
                                                                          Has exited:true

                                                                          Target ID:9
                                                                          Start time:14:49:36
                                                                          Start date:14/01/2025
                                                                          Path:C:\Windows\regsvr.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Windows\regsvr.exe"
                                                                          Imagebase:0x400000
                                                                          File size:765'953 bytes
                                                                          MD5 hash:E05F460EB752D40392F1D75D75716276
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Antivirus matches:
                                                                          • Detection: 100%, ReversingLabs
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:6%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:10.2%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:35
                                                                            execution_graph 51435 4016e5 51436 4016fd 51435->51436 51437 401711 51436->51437 51438 401802 51436->51438 51451 4017c5 51436->51451 51441 401717 51437->51441 51442 4017cc 51437->51442 51439 4018b3 51438->51439 51440 40180f 51438->51440 51500 409d4f 85 API calls 51439->51500 51443 4018a1 51440->51443 51444 401817 51440->51444 51446 401793 SetTimer RegisterClipboardFormatW 51441->51446 51447 40171c 51441->51447 51483 422413 Sleep FreeLibrary LoadLibraryA GetProcAddress 51442->51483 51474 409c69 51443->51474 51449 40181e 51444->51449 51461 401864 51444->51461 51446->51451 51452 4017ba CreatePopupMenu 51446->51452 51453 401777 KillTimer 51447->51453 51454 40171f 51447->51454 51456 401851 51449->51456 51462 401825 51449->51462 51452->51451 51482 40a45a Shell_NotifyIconW _memset 51453->51482 51458 401724 51454->51458 51459 401759 MoveWindow 51454->51459 51455 4017f7 51484 418ea0 467 API calls ctype 51455->51484 51487 40a4bd 98 API calls 51456->51487 51465 401728 51458->51465 51466 40174b SetFocus 51458->51466 51459->51451 51461->51451 51488 44e9ed 51461->51488 51462->51451 51485 40a45a Shell_NotifyIconW _memset 51462->51485 51463 40178a PostQuitMessage 51463->51451 51465->51462 51469 401731 51465->51469 51466->51451 51468 401749 51468->51451 51481 422413 Sleep FreeLibrary LoadLibraryA GetProcAddress 51469->51481 51472 40184a 51486 409f5a 118 API calls _memset 51472->51486 51475 409c7a _memset 51474->51475 51476 409d4c 51474->51476 51501 40a282 51475->51501 51476->51451 51478 409c9f 51479 409d35 KillTimer SetTimer 51478->51479 51480 409d27 Shell_NotifyIconW 51478->51480 51479->51476 51480->51479 51481->51468 51482->51463 51483->51455 51484->51468 51485->51472 51486->51451 51487->51468 51490 44e9f5 51488->51490 51491 44ea0f 51490->51491 51495 44ea11 51490->51495 51538 450ae9 51490->51538 51557 44edae 65 API calls __mtterm 51490->51557 51491->51451 51493 44ea37 51559 4550d8 65 API calls 3 library calls 51493->51559 51495->51493 51558 44f408 72 API calls __cinit 51495->51558 51496 44ea41 51560 455199 RaiseException 51496->51560 51499 44ea56 51500->51468 51502 40a29e 51501->51502 51520 40a450 51501->51520 51521 40e34a 73 API calls 51502->51521 51504 40a2ac 51505 40a2d3 51504->51505 51506 40a2b7 LoadStringW 51504->51506 51522 40e46d 51505->51522 51506->51505 51508 40a2ee 51509 40a2f7 51508->51509 51510 40a318 51508->51510 51511 40a304 51509->51511 51517 40a310 51509->51517 51526 40e505 51510->51526 51513 40e46d 73 API calls 51511->51513 51518 40a30e _memset _wcscpy _wcsncpy 51513->51518 51514 40e505 73 API calls 51514->51518 51515 40a327 51516 40e505 73 API calls 51515->51516 51515->51518 51516->51517 51517->51514 51519 40a43c Shell_NotifyIconW 51518->51519 51519->51520 51520->51478 51521->51504 51523 40e47a ___crtGetEnvironmentStringsW 51522->51523 51530 40e3fd 51523->51530 51525 40e485 ___crtGetEnvironmentStringsW 51525->51508 51527 40e512 ___crtGetEnvironmentStringsW 51526->51527 51534 40e3b1 51527->51534 51529 40e51f ___crtGetEnvironmentStringsW 51529->51515 51531 40e405 51530->51531 51532 40e426 51530->51532 51533 44e9ed 73 API calls 51531->51533 51532->51525 51533->51532 51535 40e3b9 51534->51535 51537 40e3d7 ___crtGetEnvironmentStringsW 51534->51537 51536 44e9ed 73 API calls 51535->51536 51536->51537 51537->51529 51539 450b96 51538->51539 51546 450af7 51538->51546 51568 44edae 65 API calls __mtterm 51539->51568 51541 450b0c 51541->51546 51561 455383 65 API calls 2 library calls 51541->51561 51562 4551e3 65 API calls 7 library calls 51541->51562 51563 44eaa1 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 51541->51563 51542 450b9c 51569 45507c 65 API calls ___getgmtimebuf 51542->51569 51545 450ba2 51545->51490 51546->51541 51549 450b5a RtlAllocateHeap 51546->51549 51551 450b8d 51546->51551 51552 450b81 51546->51552 51555 450b7f 51546->51555 51564 450a9a 65 API calls 4 library calls 51546->51564 51565 44edae 65 API calls __mtterm 51546->51565 51549->51546 51551->51490 51566 45507c 65 API calls ___getgmtimebuf 51552->51566 51567 45507c 65 API calls ___getgmtimebuf 51555->51567 51557->51490 51558->51493 51559->51496 51560->51499 51561->51541 51562->51541 51564->51546 51565->51546 51566->51555 51567->51551 51568->51542 51569->51545 51570 453c5e 51613 45570c 51570->51613 51572 453c6a GetStartupInfoW GetProcessHeap RtlAllocateHeap 51573 453c9c 51572->51573 51574 453ca9 GetVersionExA 51572->51574 51763 453bf9 65 API calls 2 library calls 51573->51763 51576 453cc7 GetProcessHeap HeapFree 51574->51576 51577 453cb9 GetProcessHeap HeapFree 51574->51577 51578 453cf3 51576->51578 51612 453ca3 __setmode 51577->51612 51614 457c57 HeapCreate 51578->51614 51580 453d34 51581 453d40 51580->51581 51764 453bf9 65 API calls 2 library calls 51580->51764 51623 454d93 GetModuleHandleA 51581->51623 51584 453d46 51585 453d51 __RTC_Initialize 51584->51585 51765 453bf9 65 API calls 2 library calls 51584->51765 51656 45b0d3 51585->51656 51588 453d5f 51589 453d6a 51588->51589 51766 44ea57 65 API calls 3 library calls 51588->51766 51673 45eefb 51589->51673 51597 453d8f 51719 45eac9 51597->51719 51601 453da0 51732 44eb73 51601->51732 51604 453da7 51606 453db2 __wwincmdln 51604->51606 51769 44ea57 65 API calls 3 library calls 51604->51769 51738 401902 51606->51738 51609 453de3 51771 44ed09 65 API calls _abort 51609->51771 51613->51572 51615 457c77 51614->51615 51616 457c7a 51614->51616 51615->51580 51772 457bfc 65 API calls 3 library calls 51616->51772 51618 457c7f 51619 457cad 51618->51619 51773 4570fd RtlAllocateHeap 51618->51773 51619->51580 51621 457c93 51621->51619 51622 457c98 HeapDestroy 51621->51622 51622->51615 51624 454da5 51623->51624 51625 454dae GetProcAddress GetProcAddress GetProcAddress GetProcAddress 51623->51625 51774 454a7e 68 API calls 2 library calls 51624->51774 51626 454df8 TlsAlloc 51625->51626 51630 454e46 TlsSetValue 51626->51630 51631 454f12 51626->51631 51629 454daa 51629->51584 51630->51631 51632 454e57 51630->51632 51631->51584 51775 44ed27 65 API calls 2 library calls 51632->51775 51634 454e5c 51776 45492a TlsGetValue 51634->51776 51637 45492a __init_pointers 65 API calls 51638 454e77 51637->51638 51639 45492a __init_pointers 65 API calls 51638->51639 51640 454e87 51639->51640 51641 45492a __init_pointers 65 API calls 51640->51641 51642 454e97 51641->51642 51786 4553bc 65 API calls ___crtInitCritSecAndSpinCount 51642->51786 51644 454ea4 51645 454f0d 51644->51645 51787 4549a1 TlsGetValue 51644->51787 51817 454a7e 68 API calls 2 library calls 51645->51817 51651 4549a1 __mtterm 65 API calls 51652 454eeb 51651->51652 51652->51645 51653 454ef2 51652->51653 51803 454abb 51653->51803 51655 454efa GetCurrentThreadId 51655->51631 51917 45570c 51656->51917 51658 45b0df GetStartupInfoA 51659 456f77 __calloc_crt 65 API calls 51658->51659 51660 45b100 51659->51660 51661 45b30a __setmode 51660->51661 51662 45b251 51660->51662 51665 456f77 __calloc_crt 65 API calls 51660->51665 51667 45b1d4 51660->51667 51661->51588 51663 45b287 GetStdHandle 51662->51663 51664 45b2ec SetHandleCount 51662->51664 51666 45b299 GetFileType 51662->51666 51672 45b2b0 51662->51672 51663->51662 51664->51661 51665->51660 51666->51662 51667->51662 51668 45b1fd GetFileType 51667->51668 51669 45b208 51667->51669 51668->51667 51668->51669 51669->51661 51669->51667 51918 455ce7 65 API calls 5 library calls 51669->51918 51672->51661 51672->51662 51919 455ce7 65 API calls 5 library calls 51672->51919 51674 45ef0e GetCommandLineW 51673->51674 51675 45ef3b 51673->51675 51676 45ef14 51674->51676 51677 45ef20 GetLastError 51674->51677 51678 45ef40 GetCommandLineW 51675->51678 51679 45ef2b 51675->51679 51676->51678 51677->51679 51687 453d70 51677->51687 51678->51687 51680 45ef49 GetCommandLineA MultiByteToWideChar 51679->51680 51679->51687 51681 45ef69 51680->51681 51680->51687 51682 456f77 __calloc_crt 65 API calls 51681->51682 51683 45ef71 51682->51683 51684 45ef79 MultiByteToWideChar 51683->51684 51683->51687 51685 45ef8c 51684->51685 51684->51687 51686 450d38 ___crtGetEnvironmentStringsW 65 API calls 51685->51686 51686->51687 51688 45ed9a 51687->51688 51689 45edd1 51688->51689 51690 45edb2 GetEnvironmentStringsW 51688->51690 51692 45edba 51689->51692 51693 45ee39 51689->51693 51691 45edc6 GetLastError 51690->51691 51690->51692 51691->51689 51695 45ede9 GetEnvironmentStringsW 51692->51695 51696 45edf8 51692->51696 51694 45ee42 GetEnvironmentStrings 51693->51694 51698 453d7a 51693->51698 51694->51698 51704 45ee50 _strlen 51694->51704 51695->51696 51695->51698 51920 456f37 65 API calls _malloc 51696->51920 51713 45ecef GetModuleFileNameW 51698->51713 51700 45ee57 MultiByteToWideChar 51700->51698 51700->51704 51701 45ee7a 51702 456f77 __calloc_crt 65 API calls 51701->51702 51712 45ee87 ___crtGetEnvironmentStringsW _strlen 51702->51712 51703 45ee20 FreeEnvironmentStringsW 51703->51698 51704->51700 51704->51701 51705 45ee8f FreeEnvironmentStringsA 51705->51698 51706 45eea5 MultiByteToWideChar 51709 45eef2 51706->51709 51706->51712 51707 45eedf FreeEnvironmentStringsA 51707->51698 51708 45ee19 ___crtGetEnvironmentStringsW 51708->51703 51710 450d38 ___crtGetEnvironmentStringsW 65 API calls 51709->51710 51711 45eef8 51710->51711 51711->51705 51712->51705 51712->51706 51712->51707 51714 45ed21 _wparse_cmdline 51713->51714 51715 453d84 51714->51715 51716 45ed5e 51714->51716 51715->51597 51767 44ea57 65 API calls 3 library calls 51715->51767 51921 456f37 65 API calls _malloc 51716->51921 51718 45ed64 _wparse_cmdline 51718->51715 51720 45eae2 ___crtGetEnvironmentStringsW 51719->51720 51724 453d95 51719->51724 51721 456f77 __calloc_crt 65 API calls 51720->51721 51726 45eb06 ___crtGetEnvironmentStringsW 51721->51726 51722 45eb68 51723 450d38 ___crtGetEnvironmentStringsW 65 API calls 51722->51723 51723->51724 51724->51601 51768 44ea57 65 API calls 3 library calls 51724->51768 51725 456f77 __calloc_crt 65 API calls 51725->51726 51726->51722 51726->51724 51726->51725 51727 45eb8d 51726->51727 51730 45eb50 51726->51730 51922 463299 65 API calls __mbschr_l 51726->51922 51728 450d38 ___crtGetEnvironmentStringsW 65 API calls 51727->51728 51728->51724 51730->51726 51923 454f21 8 API calls 3 library calls 51730->51923 51734 44eb7c __endthreadex 51732->51734 51924 4555ab 51734->51924 51735 44eb9b __initterm_e 51737 44ebbc __endthreadex 51735->51737 51928 44f408 72 API calls __cinit 51735->51928 51737->51604 51929 4108d2 51738->51929 51743 401970 51936 44ed7d 51743->51936 51745 401a43 2 API calls 51745->51743 51751 4019cc SystemParametersInfoW SystemParametersInfoW 51752 4019ea 51751->51752 51971 40108c GetCurrentDirectoryW 51752->51971 51755 401a04 SystemParametersInfoW 51756 401a10 51755->51756 51757 401a26 51756->51757 51758 401a1c FreeLibrary 51756->51758 52016 40fb8e 51757->52016 51758->51757 51760 401a2f 51761 40fb8e ctype VariantClear 51760->51761 51762 401a38 51761->51762 51762->51609 51770 44ece7 65 API calls _abort 51762->51770 51763->51612 51764->51581 51765->51585 51766->51589 51767->51597 51768->51601 51769->51606 51770->51609 51771->51612 51772->51618 51773->51621 51774->51629 51775->51634 51777 45493d 51776->51777 51778 45495e GetModuleHandleA 51776->51778 51777->51778 51780 454947 TlsGetValue 51777->51780 51779 45496f 51778->51779 51785 454956 51778->51785 51818 4548be 65 API calls 2 library calls 51779->51818 51783 454952 51780->51783 51782 454974 51784 454978 GetProcAddress 51782->51784 51782->51785 51783->51778 51783->51785 51784->51785 51785->51637 51786->51644 51788 4549d5 GetModuleHandleA 51787->51788 51789 4549b4 51787->51789 51791 4549e6 51788->51791 51796 4549cd 51788->51796 51789->51788 51790 4549be TlsGetValue 51789->51790 51793 4549c9 51790->51793 51819 4548be 65 API calls 2 library calls 51791->51819 51793->51788 51793->51796 51794 4549eb 51795 4549ef GetProcAddress 51794->51795 51794->51796 51795->51796 51796->51645 51797 456f77 51796->51797 51799 456f7b 51797->51799 51800 454ed1 51799->51800 51801 456f9b Sleep 51799->51801 51820 461104 51799->51820 51800->51645 51800->51651 51802 456fb0 51801->51802 51802->51799 51802->51800 51899 45570c 51803->51899 51805 454ac7 GetModuleHandleA 51806 454ae9 51805->51806 51807 454b18 InterlockedIncrement 51805->51807 51900 4548be 65 API calls 2 library calls 51806->51900 51809 455532 __lock 61 API calls 51807->51809 51811 454b3f 51809->51811 51810 454aee 51810->51807 51812 454af2 GetProcAddress GetProcAddress 51810->51812 51901 4546f8 InterlockedIncrement 51811->51901 51812->51807 51814 454b5e 51913 454b71 51814->51913 51816 454b6b __setmode 51816->51655 51817->51631 51818->51782 51819->51794 51821 461110 __setmode 51820->51821 51822 461128 51821->51822 51830 461147 _memset 51821->51830 51833 45507c 65 API calls ___getgmtimebuf 51822->51833 51824 46112d 51834 45501d 65 API calls 2 library calls 51824->51834 51826 4611b9 RtlAllocateHeap 51826->51830 51827 46113d __setmode 51827->51799 51830->51826 51830->51827 51835 455532 51830->51835 51842 457919 5 API calls 2 library calls 51830->51842 51843 461200 RtlLeaveCriticalSection __tzset_nolock 51830->51843 51844 44edae 65 API calls __mtterm 51830->51844 51833->51824 51836 455545 51835->51836 51837 455558 RtlEnterCriticalSection 51835->51837 51845 45546f 51836->51845 51837->51830 51839 45554b 51839->51837 51874 44ea57 65 API calls 3 library calls 51839->51874 51841 455557 51841->51837 51842->51830 51843->51830 51844->51830 51846 45547b __setmode 51845->51846 51847 4554a3 51846->51847 51848 45548b 51846->51848 51850 4554a1 51847->51850 51857 4554b1 __setmode 51847->51857 51875 455383 65 API calls 2 library calls 51848->51875 51850->51847 51878 456f37 65 API calls _malloc 51850->51878 51851 455490 51876 4551e3 65 API calls 7 library calls 51851->51876 51854 4554bc 51855 4554c3 51854->51855 51856 4554d2 51854->51856 51879 45507c 65 API calls ___getgmtimebuf 51855->51879 51860 455532 __lock 65 API calls 51856->51860 51857->51839 51858 455497 51877 44eaa1 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 51858->51877 51863 4554d9 51860->51863 51862 4554c8 51862->51857 51864 4554e1 51863->51864 51865 45550d 51863->51865 51880 455ce7 65 API calls 5 library calls 51864->51880 51866 450d38 ___crtGetEnvironmentStringsW 65 API calls 51865->51866 51868 4554fe 51866->51868 51895 455529 RtlLeaveCriticalSection __tzset_nolock 51868->51895 51869 4554ec 51869->51868 51881 450d38 51869->51881 51872 4554f8 51894 45507c 65 API calls ___getgmtimebuf 51872->51894 51874->51841 51875->51851 51876->51858 51878->51854 51879->51862 51880->51869 51882 450d44 __setmode 51881->51882 51883 450d83 51882->51883 51884 455532 __lock 63 API calls 51882->51884 51885 450dbd __dosmaperr __setmode 51882->51885 51883->51885 51886 450d98 RtlFreeHeap 51883->51886 51890 450d5b ___sbh_find_block 51884->51890 51885->51872 51886->51885 51887 450daa 51886->51887 51898 45507c 65 API calls ___getgmtimebuf 51887->51898 51889 450daf GetLastError 51889->51885 51893 450d75 51890->51893 51896 457170 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 51890->51896 51897 450d8e RtlLeaveCriticalSection __tzset_nolock 51893->51897 51894->51868 51895->51862 51896->51893 51897->51883 51898->51889 51899->51805 51900->51810 51902 454716 51901->51902 51903 454713 InterlockedIncrement 51901->51903 51904 454720 InterlockedIncrement 51902->51904 51905 454723 51902->51905 51903->51902 51904->51905 51906 454730 51905->51906 51907 45472d InterlockedIncrement 51905->51907 51908 45473a InterlockedIncrement 51906->51908 51909 45473d 51906->51909 51907->51906 51908->51909 51910 454752 InterlockedIncrement 51909->51910 51911 45476b InterlockedIncrement 51909->51911 51912 454762 InterlockedIncrement 51909->51912 51910->51909 51911->51814 51912->51909 51916 45545a RtlLeaveCriticalSection 51913->51916 51915 454b78 51915->51816 51916->51915 51917->51658 51918->51669 51919->51672 51920->51708 51921->51718 51922->51726 51923->51730 51925 4555af 51924->51925 51926 45492a __init_pointers 65 API calls 51925->51926 51927 4555c7 51925->51927 51926->51925 51927->51735 51928->51737 51930 40fb8e ctype VariantClear 51929->51930 51931 401950 51930->51931 51932 401a43 51931->51932 51933 401967 51932->51933 51934 401a49 LoadLibraryA 51932->51934 51933->51743 51933->51745 51934->51933 51935 401a5a GetProcAddress 51934->51935 51935->51933 51937 455532 __lock 65 API calls 51936->51937 51938 44ed85 51937->51938 51939 4549a1 __mtterm 65 API calls 51938->51939 51940 44ed90 51939->51940 51941 45492a __init_pointers 65 API calls 51940->51941 51942 44ed9b 51941->51942 52020 45545a RtlLeaveCriticalSection 51942->52020 51944 40198e 51945 44edd0 51944->51945 51946 401995 51945->51946 51947 44eddb 51945->51947 51952 4053ef GetVersionExW 51946->51952 51947->51946 52021 45507c 65 API calls ___getgmtimebuf 51947->52021 51949 44ede5 52022 45501d 65 API calls 2 library calls 51949->52022 51956 405438 _wcscpy ___crtGetEnvironmentStringsW 51952->51956 51953 405676 LoadLibraryA 51954 40568c GetProcAddress 51953->51954 51955 40569e 51953->51955 51954->51955 51957 4056a3 GetCurrentProcess 51954->51957 51955->51957 51956->51953 51958 4056b0 51957->51958 51959 4056d8 51958->51959 51960 40570e GetSystemInfo 51958->51960 52023 40576f 51959->52023 51968 405718 51960->51968 51963 405701 51967 405707 FreeLibrary 51963->51967 51963->51968 51964 405762 FreeLibrary 51965 40199f 51964->51965 51965->51751 51965->51752 51966 40576f 2 API calls 51969 4056ef GetNativeSystemInfo 51966->51969 51967->51968 51968->51964 51968->51965 51969->51963 52027 4013fe 51971->52027 51973 4010bb 52096 40e2b5 GetModuleHandleA 51973->52096 51976 4010c4 MessageBoxA 51978 4012b3 51976->51978 51977 4010dd 51979 40110b 51977->51979 51980 4010eb 51977->51980 51978->51755 51978->51756 52100 406bfc 51979->52100 52167 4065b2 73 API calls 51980->52167 51983 4010ff 52112 418bd1 51983->52112 51985 401133 GetFullPathNameW 51985->51983 51986 401124 51987 4012a6 SetCurrentDirectoryW 51986->51987 51987->51978 51990 401169 52168 40677e 74 API calls ctype 51990->52168 51991 40118f 51993 401241 51991->51993 52126 40d99a 51991->52126 52135 4012ba GetSysColorBrush LoadCursorW LoadIconW LoadIconW 51993->52135 51994 401173 SetCurrentDirectoryW 51994->51978 51999 4011ab 51999->51993 52001 4011b3 GetModuleFileNameW 51999->52001 52000 40124b 52002 40125e 52000->52002 52173 409f5a 118 API calls _memset 52000->52173 52003 4011c9 52001->52003 52004 40121a GetForegroundWindow ShellExecuteW 52001->52004 52142 418d3c 52002->52142 52169 40e30a 52003->52169 52013 40126a 52004->52013 52008 4011d7 52010 40e505 73 API calls 52008->52010 52011 4011df 52010->52011 52012 40e505 73 API calls 52011->52012 52014 4011e7 GetForegroundWindow ShellExecuteW 52012->52014 52174 40677e 74 API calls ctype 52013->52174 52015 401214 52014->52015 52015->52013 52017 40fb99 ctype 52016->52017 52018 40fba7 VariantClear 52017->52018 52019 40fbae ctype 52017->52019 52018->52019 52019->51760 52020->51944 52021->51949 52024 4056e6 52023->52024 52025 405775 LoadLibraryA 52023->52025 52024->51963 52024->51966 52025->52024 52026 405786 GetProcAddress 52025->52026 52026->52024 52175 40e2de 52027->52175 52031 401432 GetModuleFileNameW 52032 44e9ed 73 API calls 52031->52032 52033 40145b 52032->52033 52034 40146a 52033->52034 52247 40e37d 52033->52247 52036 40e30a 73 API calls 52034->52036 52037 401481 52036->52037 52038 401492 52037->52038 52250 40e27c 74 API calls 52037->52250 52189 40f7d3 52038->52189 52041 4014a9 52204 4101fc 52041->52204 52044 40e30a 73 API calls 52045 4014c8 52044->52045 52046 4014dc 52045->52046 52251 40e27c 74 API calls 52045->52251 52048 40f7d3 77 API calls 52046->52048 52049 4014f3 52048->52049 52050 40e30a 73 API calls 52049->52050 52051 40150a 52050->52051 52207 40e0b7 52051->52207 52053 40151b 52054 40e2de 73 API calls 52053->52054 52055 401532 52054->52055 52213 401c0e 52055->52213 52060 401567 52062 44e8b8 __wcsicmp 103 API calls 52060->52062 52061 401c0e 74 API calls 52061->52060 52063 401574 52062->52063 52064 401590 52063->52064 52065 401c0e 74 API calls 52063->52065 52066 44e8b8 __wcsicmp 103 API calls 52064->52066 52065->52064 52067 40159d 52066->52067 52068 4015a6 GetModuleFileNameW 52067->52068 52069 4015ec 52067->52069 52071 401c0e 74 API calls 52068->52071 52070 44e8b8 __wcsicmp 103 API calls 52069->52070 52072 4015f9 52070->52072 52073 4015cc 52071->52073 52076 401c0e 74 API calls 52072->52076 52080 40162b _wcscpy 52072->52080 52252 40e441 52073->52252 52075 4015d9 52078 401c0e 74 API calls 52075->52078 52079 401611 _wcscpy 52076->52079 52077 401650 52229 4114ee 52077->52229 52081 4015e7 52078->52081 52086 401c0e 74 API calls 52079->52086 52080->52077 52083 401c0e 74 API calls 52080->52083 52081->52069 52083->52077 52086->52080 52088 4101fc VariantClear 52091 40167e 52088->52091 52089 4016ac 52092 40fb8e ctype VariantClear 52089->52092 52090 41162a 74 API calls 52090->52091 52091->52089 52091->52090 52094 401c0e 74 API calls 52091->52094 52256 4102f4 74 API calls ctype 52091->52256 52095 4016bd ctype 52092->52095 52094->52091 52095->51973 52097 40e2c4 GetProcAddress 52096->52097 52098 4010c0 52096->52098 52097->52098 52099 40e2d4 52097->52099 52098->51976 52098->51977 52099->52098 52102 406c16 _memset 52100->52102 52106 401120 52102->52106 52298 40c4db 52102->52298 52103 406c7e 52302 40c50f 52103->52302 52105 406c86 52309 4514e8 52105->52309 52106->51985 52106->51986 53023 406a64 52112->53023 52116 418bf0 52125 401165 52116->52125 53034 419090 118 API calls 52116->53034 52118 418bf9 52119 418bfd GetFullPathNameW 52118->52119 52118->52125 52120 40e46d 73 API calls 52119->52120 52121 418c27 52120->52121 52122 40e46d 73 API calls 52121->52122 52123 418c34 _wcscat 52122->52123 52124 40e46d 73 API calls 52123->52124 52124->52125 52125->51990 52125->51991 52127 40d9a5 52126->52127 52128 40d9a9 OpenSCManagerW 52126->52128 52127->51999 52129 40d9e4 52128->52129 52130 40d9ba LockServiceDatabase 52128->52130 52129->51999 52131 40d9c5 UnlockServiceDatabase 52130->52131 52132 40d9ce GetLastError 52130->52132 52133 40d9db 52131->52133 52132->52133 52134 40d9dd CloseServiceHandle 52132->52134 52133->52134 52134->52129 52136 401310 52135->52136 53037 40d830 52136->53037 52138 401325 RegisterClassExW 53042 43acc5 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 52138->53042 52141 40138d CreateWindowExW CreateWindowExW ShowWindow ShowWindow 52141->52000 52143 418d74 52142->52143 52144 418d57 52142->52144 52161 418db2 52143->52161 53111 429f8a 52143->53111 53110 4187cb 115 API calls 4 library calls 52144->53110 52148 418e0e 52150 418e36 52148->52150 52151 418d6c 52148->52151 53126 422413 Sleep FreeLibrary LoadLibraryA GetProcAddress 52150->53126 52151->52013 52154 418e10 52156 4101fc VariantClear 52154->52156 52155 418e42 53127 43bf2c 75 API calls 52155->53127 52156->52148 52159 418e47 52159->52151 53128 418ea0 467 API calls ctype 52159->53128 52161->52148 52161->52154 53046 418c78 52161->53046 53055 418f7b 52161->53055 53075 429c2b 52161->53075 52162 418e56 LockWindowUpdate 52164 418e69 52162->52164 52165 418e87 GetMessageW 52164->52165 52165->52151 52166 418e71 TranslateMessage DispatchMessageW 52165->52166 52166->52165 52167->51983 52168->51994 52170 40e313 ___crtGetEnvironmentStringsW 52169->52170 52171 44e9ed 73 API calls 52170->52171 52172 40e32e ___crtGetEnvironmentStringsW 52171->52172 52172->52008 52173->52002 52174->51987 52176 44e9ed 73 API calls 52175->52176 52177 401414 52176->52177 52178 401a75 52177->52178 52179 401a82 ctype 52178->52179 52180 40e46d 73 API calls 52179->52180 52188 401aa2 52180->52188 52181 401ba0 52182 40e30a 73 API calls 52181->52182 52187 401bfe 52181->52187 52184 401bf6 52182->52184 52183 40e30a 73 API calls 52183->52188 52258 401c6f 73 API calls 52184->52258 52187->52031 52188->52181 52188->52183 52257 401c6f 73 API calls 52188->52257 52190 40f7ea 52189->52190 52191 40f7fb 52190->52191 52192 40f7ee 52190->52192 52194 44e9ed 73 API calls 52191->52194 52259 410048 52192->52259 52196 40f803 52194->52196 52195 40f7f9 52195->52041 52197 40e2de 73 API calls 52196->52197 52198 40f811 52196->52198 52197->52198 52199 40e441 73 API calls 52198->52199 52200 40f81c 52199->52200 52201 44e9ed 73 API calls 52200->52201 52202 40f829 52201->52202 52203 410048 77 API calls 52202->52203 52203->52195 52205 40fb8e ctype VariantClear 52204->52205 52206 4014bb 52205->52206 52206->52044 52208 40e0d9 52207->52208 52209 40e0bd 52207->52209 52211 40e0c0 52208->52211 52289 40e27c 74 API calls 52208->52289 52209->52211 52288 40e27c 74 API calls 52209->52288 52211->52053 52214 401c15 52213->52214 52215 401c27 52213->52215 52216 40e46d 73 API calls 52214->52216 52217 401c36 52215->52217 52290 401d3c 74 API calls 52215->52290 52218 40153e 52216->52218 52220 40e441 73 API calls 52217->52220 52221 44e8b8 52218->52221 52220->52218 52222 44e8c4 52221->52222 52223 44e935 52221->52223 52225 40154b 52222->52225 52291 45507c 65 API calls ___getgmtimebuf 52222->52291 52293 44e7a9 103 API calls 3 library calls 52223->52293 52225->52060 52225->52061 52227 44e8d1 52292 45501d 65 API calls 2 library calls 52227->52292 52230 4114fe 52229->52230 52233 411503 ctype 52229->52233 52294 41142c 74 API calls ctype 52230->52294 52232 40166b 52239 41162a 52232->52239 52233->52232 52295 411471 VariantClear ctype 52233->52295 52235 411537 52235->52232 52236 44e9ed 73 API calls 52235->52236 52237 4115a5 52236->52237 52238 44e9ed 73 API calls 52237->52238 52238->52232 52240 411637 52239->52240 52242 41163e 52239->52242 52296 41142c 74 API calls ctype 52240->52296 52243 401673 52242->52243 52244 44e9ed 73 API calls 52242->52244 52243->52088 52245 41167e 52244->52245 52245->52243 52297 40f90d 73 API calls 52245->52297 52248 44e9ed 73 API calls 52247->52248 52249 40e39b ___crtGetEnvironmentStringsW 52248->52249 52249->52034 52250->52038 52251->52046 52253 40e448 52252->52253 52255 40e454 ___crtGetEnvironmentStringsW 52252->52255 52254 40e3fd 73 API calls 52253->52254 52254->52255 52255->52075 52256->52091 52257->52188 52258->52187 52260 410057 52259->52260 52285 410076 ___crtGetEnvironmentStringsW 52259->52285 52261 40fb8e ctype VariantClear 52260->52261 52262 41005e 52261->52262 52263 410177 52262->52263 52264 410146 52262->52264 52265 4100b9 52262->52265 52266 4100fc 52262->52266 52267 41008e 52262->52267 52262->52285 52271 44e9ed 73 API calls 52263->52271 52268 44e9ed 73 API calls 52264->52268 52269 44e9ed 73 API calls 52265->52269 52274 44e9ed 73 API calls 52266->52274 52266->52285 52270 44e9ed 73 API calls 52267->52270 52272 41014d 52268->52272 52269->52285 52273 410095 52270->52273 52275 41017e 52271->52275 52281 40e30a 73 API calls 52272->52281 52286 410169 52272->52286 52283 40e37d 73 API calls 52273->52283 52273->52285 52276 41010c VariantInit VariantCopy 52274->52276 52277 4101b0 52275->52277 52278 41018f 52275->52278 52284 410128 VariantClear 52276->52284 52276->52285 52280 44e9ed 73 API calls 52277->52280 52279 44e9ed 73 API calls 52278->52279 52279->52285 52280->52285 52281->52286 52283->52285 52284->52285 52285->52195 52287 40ebef 73 API calls 52286->52287 52287->52285 52288->52211 52289->52211 52290->52217 52291->52227 52293->52225 52294->52233 52295->52235 52296->52242 52297->52243 52352 40d6da 52298->52352 52300 40c4eb GetFullPathNameW 52301 40c504 52300->52301 52301->52103 52356 44e973 52302->52356 52304 40c52a SHGetMalloc 52305 40c54b SHGetDesktopFolder 52304->52305 52307 40c53a _wcscpy 52304->52307 52306 40c559 52305->52306 52305->52307 52306->52307 52308 40c57b SHGetPathFromIDListW 52306->52308 52307->52105 52308->52307 52358 4512da 52309->52358 52312 406697 GetFullPathNameW 52313 4066be 52312->52313 52314 4066de 52313->52314 52316 44e8b8 __wcsicmp 103 API calls 52313->52316 52318 406716 52313->52318 52315 40d6da 73 API calls 52314->52315 52317 4066ea 52315->52317 52316->52313 52388 427c0d 73 API calls 52317->52388 52321 40670d 52318->52321 52390 407480 74 API calls 52318->52390 52320 4066fa 52389 427c0d 73 API calls 52320->52389 52324 4071c2 52321->52324 52391 412a2c 52324->52391 52327 407219 52409 412f5e 52327->52409 52328 4071dc 52329 4071e1 52328->52329 52330 4071f6 52328->52330 52458 40bb27 108 API calls _printf 52329->52458 52459 406cc1 192 API calls 3 library calls 52330->52459 52335 4071ee 52336 407214 52335->52336 52336->52106 52337 40722d 52337->52329 52340 407233 52337->52340 52338 40723e 52339 44e9ed 73 API calls 52338->52339 52351 40728a 52339->52351 52341 4520b6 __fcloseall 104 API calls 52340->52341 52341->52329 52342 4073f5 52343 450d38 ___crtGetEnvironmentStringsW 65 API calls 52342->52343 52344 4073fb 52343->52344 52344->52336 52445 4520b6 52344->52445 52351->52342 52460 407163 73 API calls ___crtGetEnvironmentStringsW 52351->52460 52461 407424 103 API calls __wcsnicmp 52351->52461 52462 40f50f 73 API calls 2 library calls 52351->52462 52463 4074e3 73 API calls 52351->52463 52464 4075af 73 API calls 52351->52464 52353 40d6e4 ___crtGetEnvironmentStringsW 52352->52353 52354 44e9ed 73 API calls 52353->52354 52355 40d6f9 _wcscpy 52354->52355 52355->52300 52357 44e97b 52356->52357 52357->52304 52357->52357 52359 451373 52358->52359 52366 4512f2 52358->52366 52360 4514b5 52359->52360 52361 45149a 52359->52361 52386 45507c 65 API calls ___getgmtimebuf 52360->52386 52384 45507c 65 API calls ___getgmtimebuf 52361->52384 52364 45149f 52369 406ca8 52364->52369 52385 45501d 65 API calls 2 library calls 52364->52385 52366->52359 52374 451361 52366->52374 52380 458090 65 API calls __mbschr_l 52366->52380 52368 451448 52368->52359 52368->52369 52372 4514c8 52368->52372 52369->52312 52370 4513ff 52370->52359 52371 451419 52370->52371 52382 458090 65 API calls __mbschr_l 52370->52382 52371->52359 52371->52369 52376 451432 52371->52376 52387 458090 65 API calls __mbschr_l 52372->52387 52374->52359 52379 4513e0 52374->52379 52381 458090 65 API calls __mbschr_l 52374->52381 52383 458090 65 API calls __mbschr_l 52376->52383 52379->52368 52379->52370 52380->52374 52381->52379 52382->52371 52383->52369 52384->52364 52386->52364 52387->52369 52388->52320 52389->52321 52390->52321 52465 40df43 52391->52465 52393 412a47 _strcat _strlen 52472 41210b 52393->52472 52399 412ace 52400 412ad6 52399->52400 52401 412adf 52399->52401 52402 4520b6 __fcloseall 104 API calls 52400->52402 52488 4523ce 52401->52488 52405 4071d8 52402->52405 52405->52327 52405->52328 52407 412aff 52494 453121 52407->52494 52410 412f77 52409->52410 52411 451d73 _fseek 103 API calls 52410->52411 52412 412f89 52411->52412 52884 4130ce 52412->52884 52415 4523ce __fread_nolock 79 API calls 52416 412fb6 52415->52416 52417 4523ce __fread_nolock 79 API calls 52416->52417 52418 412fc4 52417->52418 52419 4523ce __fread_nolock 79 API calls 52418->52419 52420 412fdd 52419->52420 52421 4523ce __fread_nolock 79 API calls 52420->52421 52422 412ff6 52421->52422 52423 451d73 _fseek 103 API calls 52422->52423 52424 41300d 52423->52424 52425 450ae9 _malloc 65 API calls 52424->52425 52426 41301a 52425->52426 52427 450ae9 _malloc 65 API calls 52426->52427 52428 413024 52427->52428 52429 4523ce __fread_nolock 79 API calls 52428->52429 52430 413033 52429->52430 52431 412c26 GetSystemTimeAsFileTime 52430->52431 52432 413049 52431->52432 52441 407229 52441->52337 52441->52338 52446 4520c2 __setmode 52445->52446 52447 4520d6 52446->52447 52448 4520f3 52446->52448 52948 45507c 65 API calls ___getgmtimebuf 52447->52948 52450 4534ec _fseek 66 API calls 52448->52450 52454 4520eb __setmode 52448->52454 52453 45210b 52450->52453 52451 4520db 52949 45501d 65 API calls 2 library calls 52451->52949 52932 452044 52453->52932 52454->52336 52458->52335 52459->52336 52460->52351 52461->52351 52462->52351 52463->52351 52464->52351 52466 40df64 WideCharToMultiByte 52465->52466 52470 40df51 ___crtGetEnvironmentStringsW 52465->52470 52467 40df81 52466->52467 52468 40df7d 52466->52468 52469 44e9ed 73 API calls 52467->52469 52468->52393 52471 40df91 WideCharToMultiByte 52469->52471 52470->52466 52471->52468 52473 412126 _memset 52472->52473 52475 4121ae 52473->52475 52507 4517b6 52473->52507 52476 451cd9 52475->52476 52522 451c13 52476->52522 52478 412abc 52478->52405 52479 412b2b 52478->52479 52482 412b38 _strcat ___crtGetEnvironmentStringsW 52479->52482 52480 4523ce __fread_nolock 79 API calls 52480->52482 52482->52480 52483 412be1 52482->52483 52487 412c01 __tzset_nolock 52482->52487 52578 451d73 52482->52578 52484 451d73 _fseek 103 API calls 52483->52484 52485 412bef 52484->52485 52486 4523ce __fread_nolock 79 API calls 52485->52486 52486->52487 52487->52399 52705 452338 52488->52705 52490 412aec 52491 412c26 52490->52491 52876 41288d 52491->52876 52493 412c3c 52493->52407 52495 45312d __setmode 52494->52495 52496 453158 52495->52496 52497 45313b 52495->52497 52498 4534ec _fseek 66 API calls 52496->52498 52881 45507c 65 API calls ___getgmtimebuf 52497->52881 52500 453160 52498->52500 52502 452f89 __ftell_nolock 69 API calls 52500->52502 52501 453140 52882 45501d 65 API calls 2 library calls 52501->52882 52504 45316c 52502->52504 52883 453185 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 52504->52883 52506 453150 __setmode 52506->52405 52508 4517c4 52507->52508 52509 4517e1 52507->52509 52518 45507c 65 API calls ___getgmtimebuf 52508->52518 52509->52508 52510 4517e8 52509->52510 52520 458ae0 101 API calls 14 library calls 52510->52520 52513 4517c9 52519 45501d 65 API calls 2 library calls 52513->52519 52514 45180e 52516 4517d9 52514->52516 52521 45642e 99 API calls 5 library calls 52514->52521 52516->52473 52518->52513 52520->52514 52521->52516 52524 451c1f __setmode 52522->52524 52523 451c32 52557 45507c 65 API calls ___getgmtimebuf 52523->52557 52524->52523 52526 451c68 52524->52526 52541 459954 68 API calls 8 library calls 52526->52541 52527 451c37 52558 45501d 65 API calls 2 library calls 52527->52558 52530 451c6d 52531 451c74 52530->52531 52532 451c81 52530->52532 52559 45507c 65 API calls ___getgmtimebuf 52531->52559 52534 451ca9 52532->52534 52535 451c89 52532->52535 52542 4596c8 52534->52542 52560 45507c 65 API calls ___getgmtimebuf 52535->52560 52539 451c47 @_EH4_CallFilterFunc@8 __setmode 52539->52478 52541->52530 52550 4596e9 __wopenfile 52542->52550 52543 459703 52565 45507c 65 API calls ___getgmtimebuf 52543->52565 52545 4598b2 52545->52543 52548 45990a 52545->52548 52546 459708 52566 45501d 65 API calls 2 library calls 52546->52566 52562 462b63 52548->52562 52550->52543 52550->52545 52552 44e8b8 __wcsicmp 103 API calls 52550->52552 52553 4598ac 52552->52553 52553->52545 52554 44e8b8 __wcsicmp 103 API calls 52553->52554 52555 4598c8 52554->52555 52555->52545 52556 44e8b8 __wcsicmp 103 API calls 52555->52556 52556->52545 52557->52527 52559->52539 52560->52539 52561 451ccf RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 52561->52539 52567 462a97 52562->52567 52564 451cb4 52564->52561 52565->52546 52570 462aa3 __setmode 52567->52570 52568 462ab6 52569 45507c __mbschr_l 65 API calls 52568->52569 52571 462abb 52569->52571 52570->52568 52572 462af4 52570->52572 52574 45501d __mbschr_l 65 API calls 52571->52574 52573 46233d __sopen_helper 130 API calls 52572->52573 52575 462b0e 52573->52575 52577 462aca __setmode 52574->52577 52576 462b35 __sopen_helper RtlLeaveCriticalSection 52575->52576 52576->52577 52577->52564 52581 451d7f __setmode 52578->52581 52579 451d8d 52609 45507c 65 API calls ___getgmtimebuf 52579->52609 52581->52579 52582 451dbb 52581->52582 52591 4534ec 52582->52591 52584 451d92 52610 45501d 65 API calls 2 library calls 52584->52610 52585 451dc3 52597 451cec 52585->52597 52590 451da2 __setmode 52590->52482 52592 45351c RtlEnterCriticalSection 52591->52592 52593 4534fa 52591->52593 52592->52585 52593->52592 52594 453502 52593->52594 52595 455532 __lock 65 API calls 52594->52595 52596 453512 52595->52596 52596->52585 52598 451d0a 52597->52598 52599 451cfa 52597->52599 52604 451d1c 52598->52604 52612 452f89 52598->52612 52667 45507c 65 API calls ___getgmtimebuf 52599->52667 52601 451cff 52611 451dee RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 52601->52611 52629 452b85 52604->52629 52609->52584 52611->52590 52613 452fba 52612->52613 52614 452f9a 52612->52614 52616 452a09 __flswbuf 65 API calls 52613->52616 52668 45507c 65 API calls ___getgmtimebuf 52614->52668 52618 452fc0 52616->52618 52617 452f9f 52669 45501d 65 API calls 2 library calls 52617->52669 52620 459c49 __locking 69 API calls 52618->52620 52621 452fd5 52620->52621 52622 453048 52621->52622 52624 453003 52621->52624 52628 452faf 52621->52628 52670 45507c 65 API calls ___getgmtimebuf 52622->52670 52625 459c49 __locking 69 API calls 52624->52625 52624->52628 52626 4530a3 52625->52626 52627 459c49 __locking 69 API calls 52626->52627 52626->52628 52627->52628 52628->52604 52630 452b9a 52629->52630 52631 451d2a 52629->52631 52630->52631 52632 452a09 __flswbuf 65 API calls 52630->52632 52635 452a09 52631->52635 52633 452bb4 52632->52633 52671 45a611 99 API calls 5 library calls 52633->52671 52636 452a14 52635->52636 52637 451d5b 52635->52637 52672 45507c 65 API calls ___getgmtimebuf 52636->52672 52642 459c49 52637->52642 52639 452a19 52673 45501d 65 API calls 2 library calls 52639->52673 52643 459c55 __setmode 52642->52643 52644 459c5d 52643->52644 52645 459c78 52643->52645 52674 45508f 65 API calls ___getgmtimebuf 52644->52674 52647 459c86 52645->52647 52650 459cc7 52645->52650 52676 45508f 65 API calls ___getgmtimebuf 52647->52676 52648 459c62 52675 45507c 65 API calls ___getgmtimebuf 52648->52675 52679 45b660 52650->52679 52652 459c8b 52677 45507c 65 API calls ___getgmtimebuf 52652->52677 52655 459ccd 52657 459cf0 52655->52657 52658 459cda 52655->52658 52656 459c92 52678 45501d 65 API calls 2 library calls 52656->52678 52702 45507c 65 API calls ___getgmtimebuf 52657->52702 52691 459bd7 52658->52691 52662 459c6a __setmode 52662->52601 52664 459cf5 52667->52601 52668->52617 52670->52628 52671->52631 52672->52639 52674->52648 52675->52662 52676->52652 52677->52656 52680 45b66c __setmode 52679->52680 52681 45b6c7 52680->52681 52684 455532 __lock 65 API calls 52680->52684 52682 45b6cc RtlEnterCriticalSection 52681->52682 52683 45b6e9 __setmode 52681->52683 52682->52683 52683->52655 52685 45b698 52684->52685 52686 45b6a1 52685->52686 52687 45b6bb 52685->52687 52689 455ce7 ___crtInitCritSecAndSpinCount 65 API calls 52686->52689 52688 45b6f7 __setmode RtlLeaveCriticalSection 52687->52688 52688->52681 52690 45b6af 52689->52690 52690->52687 52692 45b5ef __chsize_nolock 65 API calls 52691->52692 52702->52664 52706 452344 __setmode 52705->52706 52707 45238d 52706->52707 52708 452358 _memset 52706->52708 52709 452382 __setmode 52706->52709 52710 4534ec _fseek 66 API calls 52707->52710 52734 45507c 65 API calls ___getgmtimebuf 52708->52734 52709->52490 52711 452395 52710->52711 52718 452132 52711->52718 52714 452372 52735 45501d 65 API calls 2 library calls 52714->52735 52719 45216c 52718->52719 52722 45214e _memset 52718->52722 52736 4523c4 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 52719->52736 52720 452157 52787 45507c 65 API calls ___getgmtimebuf 52720->52787 52722->52719 52722->52720 52725 4521ab 52722->52725 52725->52719 52726 452a09 __flswbuf 65 API calls 52725->52726 52730 4522c7 _memset 52725->52730 52733 4522f3 _memset 52725->52733 52737 45af5b 52725->52737 52767 45a87a 52725->52767 52789 45b058 65 API calls 3 library calls 52725->52789 52726->52725 52790 45507c 65 API calls ___getgmtimebuf 52730->52790 52732 45215c 52788 45501d 65 API calls 2 library calls 52732->52788 52791 45507c 65 API calls ___getgmtimebuf 52733->52791 52734->52714 52736->52709 52738 45af67 __setmode 52737->52738 52739 45af6f 52738->52739 52740 45af8a 52738->52740 52863 45508f 65 API calls ___getgmtimebuf 52739->52863 52741 45af98 52740->52741 52746 45afd9 52740->52746 52865 45508f 65 API calls ___getgmtimebuf 52741->52865 52744 45af74 52864 45507c 65 API calls ___getgmtimebuf 52744->52864 52745 45af9d 52866 45507c 65 API calls ___getgmtimebuf 52745->52866 52749 45afe6 52746->52749 52750 45affa 52746->52750 52868 45508f 65 API calls ___getgmtimebuf 52749->52868 52751 45b660 __setmode 66 API calls 52750->52751 52754 45b000 52751->52754 52752 45afa4 52867 45501d 65 API calls 2 library calls 52752->52867 52757 45b023 52754->52757 52758 45b00d 52754->52758 52755 45afeb 52869 45507c 65 API calls ___getgmtimebuf 52755->52869 52756 45af7c __setmode 52756->52725 52870 45507c 65 API calls ___getgmtimebuf 52757->52870 52792 45a99a 52758->52792 52763 45b01b 52872 45b04e RtlLeaveCriticalSection __locking 52763->52872 52764 45b028 52871 45508f 65 API calls ___getgmtimebuf 52764->52871 52768 45a886 52767->52768 52773 45a8a3 52767->52773 52873 45507c 65 API calls ___getgmtimebuf 52768->52873 52770 45a89b 52770->52725 52771 45a88b 52874 45501d 65 API calls 2 library calls 52771->52874 52773->52770 52774 45a8d7 52773->52774 52875 460f22 65 API calls __malloc_crt 52773->52875 52776 452a09 __flswbuf 65 API calls 52774->52776 52777 45a8eb 52776->52777 52778 45af5b __filbuf 77 API calls 52777->52778 52779 45a8f2 52778->52779 52779->52770 52780 452a09 __flswbuf 65 API calls 52779->52780 52781 45a911 52780->52781 52781->52770 52782 452a09 __flswbuf 65 API calls 52781->52782 52783 45a91d 52782->52783 52783->52770 52784 452a09 __flswbuf 65 API calls 52783->52784 52785 45a929 52784->52785 52787->52732 52789->52725 52790->52732 52791->52732 52793 45a9b4 52792->52793 52794 45a9cf 52792->52794 52795 45508f __lseeki64 65 API calls 52793->52795 52796 45a9de 52794->52796 52798 45aa05 52794->52798 52797 45a9b9 52795->52797 52799 45508f __lseeki64 65 API calls 52796->52799 52801 45507c __mbschr_l 65 API calls 52797->52801 52800 45aa24 52798->52800 52814 45aa38 52798->52814 52802 45a9e3 52799->52802 52803 45508f __lseeki64 65 API calls 52800->52803 52815 45a9c1 52801->52815 52805 45507c __mbschr_l 65 API calls 52802->52805 52807 45aa29 52803->52807 52804 45aa90 52806 45508f __lseeki64 65 API calls 52804->52806 52814->52804 52814->52815 52816 45aa6c 52814->52816 52817 45aab1 52814->52817 52815->52763 52816->52804 52863->52744 52864->52756 52865->52745 52866->52752 52868->52755 52869->52752 52870->52764 52871->52763 52872->52756 52873->52771 52875->52774 52879 452f3f GetSystemTimeAsFileTime 52876->52879 52878 41289c 52878->52493 52880 452f6d __aulldiv 52879->52880 52880->52878 52881->52501 52883->52506 52885 4130dd __tzset_nolock _wcscpy 52884->52885 52886 4523ce 79 API calls __fread_nolock 52885->52886 52887 412c26 GetSystemTimeAsFileTime 52885->52887 52888 412f9d 52885->52888 52889 451d73 103 API calls _fseek 52885->52889 52886->52885 52887->52885 52888->52415 52888->52441 52889->52885 52933 452054 52932->52933 52934 452070 52932->52934 52978 45507c 65 API calls ___getgmtimebuf 52933->52978 52936 452b85 __flush 99 API calls 52934->52936 52946 452069 52934->52946 52938 45207c 52936->52938 52937 452059 52979 45501d 65 API calls 2 library calls 52937->52979 52951 45a84e 52938->52951 52950 45212a RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 52946->52950 52948->52451 52950->52454 52952 452084 52951->52952 52953 45a85a 52951->52953 52953->52952 52978->52937 53024 406a77 53023->53024 53025 406a7e 53023->53025 53024->52125 53033 42d294 117 API calls 53024->53033 53025->53024 53026 44e9ed 73 API calls 53025->53026 53027 406aa5 53026->53027 53028 44e9ed 73 API calls 53027->53028 53032 406b0b 53028->53032 53030 406b7e 53032->53030 53035 407671 140 API calls 53032->53035 53036 4075af 73 API calls 53032->53036 53033->52116 53034->52118 53035->53032 53036->53032 53038 40d852 EnumResourceNamesW 53037->53038 53039 40d836 LoadImageW 53037->53039 53040 40d88c LoadImageW 53038->53040 53041 40d89e 53038->53041 53039->52138 53040->53041 53041->52138 53043 43ad5d LoadIconW 53042->53043 53045 401246 53043->53045 53045->52141 53047 418c87 53046->53047 53048 418c8b 53046->53048 53047->52161 53048->53047 53049 418c9d PeekMessageW 53048->53049 53051 418cf6 53049->53051 53052 418cb5 53049->53052 53051->52161 53052->53051 53053 418ce2 PeekMessageW 53052->53053 53054 418cce TranslateMessage DispatchMessageW 53052->53054 53129 43ad9e 53052->53129 53053->53051 53053->53052 53054->53053 53134 4195b3 53055->53134 53058 418f8f 53058->52161 53060 418fa8 Sleep 53060->53058 53061 418fb7 53061->53058 53162 4196e6 53061->53162 53068 418fe2 GetExitCodeProcess 53068->53060 53071 418ffd CloseHandle 53068->53071 53069 419026 53308 4300ab 180 API calls 53069->53308 53073 4101fc VariantClear 53071->53073 53072 41902d 53072->53058 53282 4378e9 53072->53282 53073->53058 53076 41a21d 74 API calls 53075->53076 53077 429c4b 53076->53077 53078 429d63 53077->53078 53079 429c56 53077->53079 54675 42af4e 53078->54675 53081 429d0d 53079->53081 53082 429c5d 53079->53082 53084 429d78 467 API calls 53081->53084 53085 429d03 53082->53085 53086 429c66 53082->53086 53083 429cda 53083->52161 53088 429d01 53084->53088 54598 42a8d6 53085->54598 53089 429c69 53086->53089 53090 429cdf 53086->53090 53091 429d58 53088->53091 53095 41a21d 74 API calls 53088->53095 53092 429c87 53089->53092 53093 429c6c 53089->53093 53094 429fd7 467 API calls 53090->53094 53096 40fb8e ctype VariantClear 53091->53096 53099 429c98 53092->53099 53100 429cad 53092->53100 53093->53083 53098 41a21d 74 API calls 53093->53098 53094->53088 53097 429d3d 53095->53097 53096->53083 53097->53091 53104 41a21d 74 API calls 53097->53104 53101 429c80 53098->53101 53102 41a21d 74 API calls 53099->53102 54729 42ad16 467 API calls ctype 53100->54729 54730 4187cb 115 API calls 4 library calls 53101->54730 53102->53101 53106 429d4e 53104->53106 53105 429cb9 53105->53083 53109 41a21d 74 API calls 53105->53109 54731 4187cb 115 API calls 4 library calls 53106->54731 53109->53101 53110->52151 53112 40e30a 73 API calls 53111->53112 53113 429f9b 53112->53113 54836 40f5d7 53113->54836 53115 418d9f 53115->52161 53116 419eca 53115->53116 53117 419ef3 53116->53117 53118 419eee 53116->53118 53120 418d3c 467 API calls 53117->53120 53119 40e114 74 API calls 53118->53119 53119->53117 53121 419efd 53120->53121 53122 419f08 53121->53122 54839 40e16e VariantClear 53121->54839 53124 419f13 53122->53124 54840 41a179 VariantClear 53122->54840 53124->52161 53126->52155 53127->52159 53128->52162 53133 43adb1 53129->53133 53130 43ae4e 53130->53052 53131 43ae2a IsDialogMessageW 53131->53130 53131->53133 53132 43ade4 GetClassNameW 53132->53131 53132->53133 53133->53130 53133->53131 53133->53132 53135 4195cb 53134->53135 53152 418f8b 53134->53152 53136 4195d9 MessageBoxA 53135->53136 53139 4195d5 53135->53139 53137 44e9ed 73 API calls 53136->53137 53137->53139 53138 41966f 53140 419682 53138->53140 53138->53152 53311 407480 74 API calls 53138->53311 53139->53138 53144 419638 53139->53144 53309 407480 74 API calls 53139->53309 53143 429f8a 74 API calls 53140->53143 53145 4196a8 53143->53145 53144->53138 53310 407480 74 API calls 53144->53310 53147 4196b8 53145->53147 53312 407480 74 API calls 53145->53312 53149 40e441 73 API calls 53147->53149 53150 4196d3 53149->53150 53313 419f26 467 API calls ctype 53150->53313 53152->53058 53152->53060 53153 419536 53152->53153 53154 419545 53153->53154 53155 4195af 53153->53155 53154->53155 53156 41954e timeGetTime 53154->53156 53155->53061 53157 419562 53156->53157 53157->53155 53158 429f8a 74 API calls 53157->53158 53159 41958d 53158->53159 53314 419f26 467 API calls ctype 53159->53314 53161 4195a4 53161->53061 53163 418fc2 53162->53163 53164 4196fb 53162->53164 53163->53058 53193 41991a 53163->53193 53164->53163 53165 419715 53164->53165 53166 40e2de 73 API calls 53165->53166 53167 41971d 53166->53167 53169 41981c 53167->53169 53170 429f8a 74 API calls 53167->53170 53171 419755 53167->53171 53315 43af73 75 API calls 53167->53315 53169->53163 53170->53167 53172 4101fc VariantClear 53171->53172 53173 41976e 53172->53173 53174 40e30a 73 API calls 53173->53174 53175 41977b 53174->53175 53176 40f7d3 77 API calls 53175->53176 53177 41978e 53176->53177 53316 41028f VariantClear ctype 53177->53316 53179 4197a2 53180 40e30a 73 API calls 53179->53180 53181 4197af 53180->53181 53182 40f7d3 77 API calls 53181->53182 53183 4197be 53182->53183 53317 41028f VariantClear ctype 53183->53317 53185 4197d2 53186 40e30a 73 API calls 53185->53186 53187 4197df 53186->53187 53188 40f7d3 77 API calls 53187->53188 53189 4197ee 53188->53189 53318 419f26 467 API calls ctype 53189->53318 53191 41980d 53192 40fb8e ctype VariantClear 53191->53192 53192->53169 53194 418fcc 53193->53194 53195 419933 53193->53195 53194->53058 53263 419838 53194->53263 53195->53194 53196 40e2de 73 API calls 53195->53196 53197 41996b InterlockedIncrement 53196->53197 53198 4199ab 53197->53198 53199 419988 53197->53199 53201 419ea1 InterlockedDecrement 53198->53201 53203 4199db 53198->53203 53199->53198 53200 41998e InterlockedDecrement Sleep InterlockedIncrement 53199->53200 53200->53198 53200->53199 53202 419e96 53201->53202 53207 40fb8e ctype VariantClear 53202->53207 53319 405aa7 53203->53319 53205 4199ed 53206 410048 77 API calls 53205->53206 53208 4199f6 53206->53208 53209 419eb9 53207->53209 53211 405aa7 74 API calls 53208->53211 53451 40f330 VariantClear ctype 53209->53451 53212 419a00 53211->53212 53324 40fc41 53212->53324 53215 40e46d 73 API calls 53216 419a17 53215->53216 53217 405aa7 74 API calls 53216->53217 53218 419a22 53217->53218 53219 40fc41 109 API calls 53218->53219 53220 419a29 53219->53220 53221 40e505 73 API calls 53220->53221 53222 419a32 53221->53222 53223 429f8a 74 API calls 53222->53223 53224 419a4e 53223->53224 53225 419ac5 53224->53225 53226 405aa7 74 API calls 53224->53226 53228 40e30a 73 API calls 53225->53228 53227 419a6d 53226->53227 53229 40fc41 109 API calls 53227->53229 53230 419ae0 53228->53230 53231 419a74 53229->53231 53232 40f7d3 77 API calls 53230->53232 53233 429f8a 74 API calls 53231->53233 53251 419aff 53232->53251 53234 419a7b 53233->53234 53234->53225 53235 419a7f 53234->53235 53328 40f402 VariantClear ctype 53235->53328 53237 419a96 InterlockedDecrement 53238 419aad 53237->53238 53241 40fb8e ctype VariantClear 53238->53241 53239 419b2f 53330 40f402 VariantClear ctype 53239->53330 53243 419ab6 53241->53243 53242 419b46 InterlockedDecrement 53331 40e114 53242->53331 53329 40f330 VariantClear ctype 53243->53329 53246 41a21d 74 API calls 53246->53251 53247 419c56 53345 4187cb 115 API calls 4 library calls 53247->53345 53248 41a21d 74 API calls 53261 419b5f 53248->53261 53249 405aa7 74 API calls 53249->53251 53251->53239 53251->53246 53251->53247 53251->53249 53337 40f34f 53251->53337 53253 4101fc VariantClear 53253->53261 53254 419eca 460 API calls 53254->53261 53255 405aa7 74 API calls 53255->53261 53257 40e30a 73 API calls 53257->53261 53258 40e27c 74 API calls 53258->53261 53259 4074e3 73 API calls 53259->53261 53260 40f7d3 77 API calls 53260->53261 53261->53202 53261->53248 53261->53253 53261->53254 53261->53255 53261->53257 53261->53258 53261->53259 53261->53260 53346 42f0bb 53261->53346 53450 40e16e VariantClear 53261->53450 53264 418fd5 53263->53264 53265 41984d 53263->53265 53264->53058 53264->53068 53264->53069 53265->53264 53266 41985c 53265->53266 53267 40e2de 73 API calls 53266->53267 53268 419864 53267->53268 53270 4198fe 53268->53270 53271 429f8a 74 API calls 53268->53271 53272 41989d 53268->53272 54593 40aad7 75 API calls 53268->54593 53270->53264 53271->53268 53273 4101fc VariantClear 53272->53273 53274 4198b3 53273->53274 53275 40e30a 73 API calls 53274->53275 53276 4198c0 53275->53276 53277 40f7d3 77 API calls 53276->53277 53278 4198d2 53277->53278 54594 419f26 467 API calls ctype 53278->54594 53280 4198ef 53281 40fb8e ctype VariantClear 53280->53281 53281->53270 53283 437916 Sleep 53282->53283 53284 4378fb 53282->53284 53285 43796b 53283->53285 53286 437928 timeGetTime 53283->53286 53284->53283 53298 43790f 53284->53298 53287 437976 53285->53287 53288 4379a4 53285->53288 53289 437938 53286->53289 53291 437999 53287->53291 53292 437979 53287->53292 53290 437a84 158 API calls 53288->53290 53289->53285 53301 437947 53289->53301 53296 437986 53290->53296 53295 437a84 158 API calls 53291->53295 53293 437990 53292->53293 53294 43797c 53292->53294 54596 437c5d 159 API calls 53293->54596 53294->53298 53299 43797f 53294->53299 53295->53296 53297 43798c 53296->53297 53307 4101fc VariantClear 53296->53307 53297->53298 53304 43798e 53297->53304 53298->53058 54595 437c5d 159 API calls 53299->54595 53301->53298 53302 4101fc VariantClear 53301->53302 53302->53298 54597 40d649 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 53304->54597 53305 437997 53305->53296 53307->53297 53308->53072 53309->53144 53310->53144 53311->53140 53312->53147 53313->53152 53314->53161 53315->53167 53316->53179 53317->53185 53318->53191 53320 405aac MessageBoxA 53319->53320 53321 405ade 53319->53321 53322 44e9ed 73 API calls 53320->53322 53321->53205 53323 405ac7 53322->53323 53323->53205 53325 40fc4a 53324->53325 53326 40fc5c 53325->53326 53452 40fea7 109 API calls 5 library calls 53325->53452 53326->53215 53328->53237 53329->53194 53330->53242 53332 40e135 53331->53332 53335 40e126 53331->53335 53333 44e9ed 73 API calls 53332->53333 53333->53335 53453 40f724 53335->53453 53336 40e16b 53336->53261 53338 40f357 53337->53338 53344 40f385 53337->53344 53341 44e9ed 73 API calls 53338->53341 53339 44e9ed 73 API calls 53340 40f3c1 53339->53340 53342 40f3d2 53340->53342 53461 40f93c 76 API calls ___crtGetEnvironmentStringsW 53340->53461 53341->53344 53342->53251 53344->53339 53345->53261 53347 42f0d6 53346->53347 53348 42f0f9 53346->53348 53530 44f408 72 API calls __cinit 53347->53530 53462 42dcea 53348->53462 53353 42dcea 73 API calls 53427 42f14f 53353->53427 53354 42fa38 53356 42fa3f 53354->53356 53380 42fa7e 53354->53380 53355 42dd54 74 API calls 53355->53427 53357 42f7a8 53618 4187cb 115 API calls 4 library calls 53357->53618 53358 42fa0a 53625 4187cb 115 API calls 4 library calls 53358->53625 53362 42f262 53362->53261 53363 42f9dc 53624 4187cb 115 API calls 4 library calls 53363->53624 53367 40fb8e ctype VariantClear 53367->53380 53369 42f7fc 53619 4187cb 115 API calls 4 library calls 53369->53619 53373 42faa1 53627 4187cb 115 API calls 4 library calls 53373->53627 53379 42fb83 147 API calls 53379->53427 53380->53362 53380->53367 53382 42f957 53388 41a21d 74 API calls 53382->53388 53385 41a21d 74 API calls 53385->53427 53387 40f93c 76 API calls 53387->53427 53390 42fad6 53628 4187cb 115 API calls 4 library calls 53390->53628 53395 42f91a 53403 41a21d 74 API calls 53395->53403 53399 40eb54 74 API calls 53399->53427 53401 40fb8e ctype VariantClear 53406 42f49d 53401->53406 53402 40fb8e ctype VariantClear 53408 42f678 53402->53408 53404 40ea97 77 API calls 53404->53427 53405 42f997 53415 41a21d 74 API calls 53405->53415 53406->53362 53406->53401 53407 4101fc VariantClear 53407->53427 53408->53362 53408->53402 53409 40e2de 73 API calls 53409->53427 53413 42fb0b 53629 4187cb 115 API calls 4 library calls 53413->53629 53417 40fb8e ctype VariantClear 53422 42f348 53417->53422 53422->53362 53422->53417 53423 40e46d 73 API calls 53423->53427 53425 40fb8e VariantClear ctype 53425->53427 53426 40e30a 73 API calls 53426->53427 53427->53353 53427->53354 53427->53355 53427->53357 53427->53358 53427->53363 53427->53369 53427->53373 53427->53379 53427->53382 53427->53385 53427->53387 53427->53390 53427->53395 53427->53399 53427->53404 53427->53405 53427->53406 53427->53407 53427->53408 53427->53409 53427->53413 53427->53422 53427->53423 53427->53425 53427->53426 53430 41086d VariantClear 53427->53430 53439 42f223 53427->53439 53471 42e5d8 53427->53471 53513 429d78 53427->53513 53532 4102a8 VariantClear ctype 53427->53532 53533 41026f VariantClear ctype 53427->53533 53534 410886 74 API calls ctype 53427->53534 53535 42e118 467 API calls 2 library calls 53427->53535 53536 4102c1 53427->53536 53543 42dd83 111 API calls 53427->53543 53544 42deca 164 API calls ctype 53427->53544 53545 4284b9 149 API calls ctype 53427->53545 53546 42e2c4 467 API calls ctype 53427->53546 53547 429fd7 53427->53547 53620 43004b 74 API calls 53427->53620 53430->53427 53443 41a21d 74 API calls 53439->53443 53445 42f22e 53443->53445 53450->53261 53451->53194 53452->53326 53454 40f730 53453->53454 53460 40f760 53453->53460 53455 40f73d 53454->53455 53456 40f724 VariantClear 53454->53456 53457 40f74c 53455->53457 53458 40f724 VariantClear 53455->53458 53456->53455 53459 40fb8e ctype VariantClear 53457->53459 53457->53460 53458->53457 53459->53460 53460->53336 53461->53342 53463 42dcf0 53462->53463 53464 42dcfd 53462->53464 53466 41a21d 53463->53466 53465 44e9ed 73 API calls 53464->53465 53465->53463 53467 41a222 MessageBoxA 53466->53467 53468 41a24e 53466->53468 53469 44e9ed 73 API calls 53467->53469 53468->53427 53470 41a23d 53469->53470 53470->53427 53472 42e605 _memset 53471->53472 53514 41a21d 74 API calls 53513->53514 53530->53348 53532->53427 53533->53427 53534->53427 53535->53427 53537 40fb8e ctype VariantClear 53536->53537 53543->53427 53544->53427 53545->53427 53546->53427 53548 41a21d 74 API calls 53547->53548 53620->53427 54593->53268 54594->53280 54595->53296 54596->53305 54597->53298 54599 41a21d 74 API calls 54598->54599 54600 42a8ee 54599->54600 54601 40e30a 73 API calls 54600->54601 54602 42a8f8 54601->54602 54603 40e0b7 74 API calls 54602->54603 54604 42a910 54603->54604 54605 42aa23 54604->54605 54606 42a941 54604->54606 54607 42a925 54604->54607 54608 41a21d 74 API calls 54605->54608 54610 41a21d 74 API calls 54606->54610 54609 41a21d 74 API calls 54607->54609 54627 42aa2d 54608->54627 54672 42a92c 54609->54672 54611 42a949 54610->54611 54614 42a96a 54611->54614 54618 42a955 54611->54618 54619 42a9bd 54611->54619 54612 42aa58 54613 42f0bb 467 API calls 54612->54613 54617 42aa8a 54613->54617 54615 41a21d 74 API calls 54614->54615 54633 42a93c 54614->54633 54620 42a97f 54615->54620 54625 41a21d 74 API calls 54617->54625 54666 42aab9 54617->54666 54733 40fae0 76 API calls 54618->54733 54622 41a21d 74 API calls 54619->54622 54623 42a9d1 54620->54623 54628 42a98b 54620->54628 54622->54672 54623->54605 54636 41a21d 74 API calls 54623->54636 54624 40fb8e ctype VariantClear 54624->54633 54629 42aa9c 54625->54629 54626 42a95a 54734 42e4b9 467 API calls ctype 54626->54734 54627->54612 54631 41a21d 74 API calls 54627->54631 54735 4284b9 149 API calls ctype 54628->54735 54634 42aaa2 54629->54634 54635 42aabe 54629->54635 54631->54612 54633->53083 54641 41a21d 74 API calls 54634->54641 54638 42ab10 54635->54638 54639 42aac4 54635->54639 54637 42a9e1 54636->54637 54642 42a9f7 54637->54642 54647 41a21d 74 API calls 54637->54647 54643 42ab17 54638->54643 54644 42ab65 54638->54644 54645 42aafe 54639->54645 54651 42aad4 54639->54651 54640 42a9a2 54640->54633 54653 41a21d 74 API calls 54640->54653 54646 42aaac 54641->54646 54736 42ad16 467 API calls ctype 54642->54736 54648 42ab59 54643->54648 54649 42ab1c 54643->54649 54652 410048 77 API calls 54644->54652 54654 41a21d 74 API calls 54645->54654 54737 4187cb 115 API calls 4 library calls 54646->54737 54656 42a9f1 54647->54656 54743 4108eb 106 API calls 2 library calls 54648->54743 54658 42ab1f 54649->54658 54659 42ab4d 54649->54659 54664 42aae5 54651->54664 54738 40e27c 74 API calls 54651->54738 54652->54666 54653->54672 54654->54646 54656->54605 54656->54642 54661 42ab22 54658->54661 54662 42ab40 54658->54662 54742 410a59 96 API calls ctype 54659->54742 54667 42ab34 54661->54667 54668 42ab25 54661->54668 54741 410c02 96 API calls ctype 54662->54741 54663 42aa04 54663->54633 54669 41a21d 74 API calls 54663->54669 54670 40f7d3 77 API calls 54664->54670 54666->54624 54740 410b48 96 API calls 2 library calls 54667->54740 54668->54666 54739 41138a 110 API calls 54668->54739 54669->54672 54670->54666 54732 4187cb 115 API calls 4 library calls 54672->54732 54676 41a21d 74 API calls 54675->54676 54677 42af68 54676->54677 54678 42b0fb 54677->54678 54680 42b042 54677->54680 54681 42afc7 54677->54681 54682 42b075 54677->54682 54683 42af89 54677->54683 54684 42b009 54677->54684 54685 42b052 54677->54685 54686 42b093 54677->54686 54687 42afd5 54677->54687 54688 42b015 54677->54688 54689 42b0e2 54677->54689 54690 42afe3 54677->54690 54691 42b063 54677->54691 54692 42b020 54677->54692 54693 42b0a0 54677->54693 54694 42af96 54677->54694 54695 42afae 54677->54695 54696 42afee 54677->54696 54697 42b0ee 54677->54697 54698 42b0b4 54677->54698 54699 42b035 54677->54699 54700 42afba 54677->54700 54701 42affc 54677->54701 54702 42af7d 54677->54702 54728 42af84 54677->54728 54824 4187cb 115 API calls 4 library calls 54678->54824 54817 42c43d 121 API calls ctype 54680->54817 54808 42b622 467 API calls ctype 54681->54808 54820 42c676 467 API calls ctype 54682->54820 54804 42dc99 74 API calls 54683->54804 54813 42be87 179 API calls ctype 54684->54813 54818 42d9fa 467 API calls ctype 54685->54818 54821 42d1db 467 API calls ctype 54686->54821 54809 42b71c 467 API calls ctype 54687->54809 54814 42bfb3 467 API calls ctype 54688->54814 54822 42c5a3 467 API calls 54689->54822 54810 42b81a 78 API calls ctype 54690->54810 54819 42cc85 467 API calls ctype 54691->54819 54815 42dc99 74 API calls 54692->54815 54783 42d130 54693->54783 54805 41a179 VariantClear 54694->54805 54806 42b4af 467 API calls ctype 54695->54806 54811 42b8de 467 API calls 54696->54811 54823 42c633 117 API calls 54697->54823 54722 41a21d 74 API calls 54698->54722 54816 42c17f 467 API calls ctype 54699->54816 54807 42b5cb 467 API calls 54700->54807 54812 42b959 467 API calls ctype 54701->54812 54744 42b1a6 54702->54744 54726 42b0c1 54722->54726 54727 429f8a 74 API calls 54726->54727 54727->54728 54728->53083 54729->53105 54730->53083 54731->53091 54732->54633 54733->54626 54734->54614 54735->54640 54736->54663 54737->54666 54738->54664 54739->54666 54740->54666 54741->54666 54742->54666 54743->54666 54825 42f06c 54744->54825 54747 41a21d 74 API calls 54748 42b1da 54747->54748 54749 42b48e 54748->54749 54751 41a21d 74 API calls 54748->54751 54750 41a21d 74 API calls 54749->54750 54753 42b499 54750->54753 54752 42b1f0 54751->54752 54752->54749 54754 42b1f9 54752->54754 54834 4187cb 115 API calls 4 library calls 54753->54834 54756 41a21d 74 API calls 54754->54756 54757 42b207 54756->54757 54761 42b276 54757->54761 54765 42b20d 54757->54765 54758 41a21d 74 API calls 54758->54765 54759 42b250 54762 41a21d 74 API calls 54759->54762 54760 42b420 54832 42dc3f 77 API calls 54760->54832 54761->54760 54764 42b437 54761->54764 54776 42f06c 467 API calls 54761->54776 54777 42b453 54761->54777 54779 42b44c 54761->54779 54780 41a21d 74 API calls 54761->54780 54781 42b439 54761->54781 54766 42b255 54762->54766 54770 40fb8e ctype VariantClear 54764->54770 54765->54758 54765->54759 54773 42b26a 54765->54773 54830 4074e3 73 API calls 54765->54830 54831 4074e3 73 API calls 54766->54831 54769 42b25e 54771 429c2b 467 API calls 54769->54771 54772 42b484 54770->54772 54771->54773 54774 40fb8e ctype VariantClear 54772->54774 54773->54728 54774->54773 54776->54761 54778 41a21d 74 API calls 54777->54778 54778->54779 54833 4187cb 115 API calls 4 library calls 54779->54833 54780->54761 54782 41a21d 74 API calls 54781->54782 54782->54779 54784 42d145 54783->54784 54785 42d15d 54783->54785 54787 41a21d 74 API calls 54784->54787 54786 41a21d 74 API calls 54785->54786 54788 42d166 54786->54788 54789 42d14c 54787->54789 54790 42d1ad 54788->54790 54791 42f0bb 467 API calls 54788->54791 54835 4187cb 115 API calls 4 library calls 54789->54835 54792 41a21d 74 API calls 54790->54792 54794 42d188 54791->54794 54795 42d1b7 54792->54795 54797 42d196 54794->54797 54798 42d18c 54794->54798 54796 42d15b 54795->54796 54799 41a21d 74 API calls 54795->54799 54796->54728 54801 410048 77 API calls 54797->54801 54800 40fb8e ctype VariantClear 54798->54800 54799->54789 54800->54796 54802 42d1a5 54801->54802 54803 40fb8e ctype VariantClear 54802->54803 54803->54790 54804->54694 54805->54728 54806->54728 54807->54728 54808->54728 54809->54728 54810->54728 54811->54728 54812->54728 54813->54728 54814->54728 54815->54728 54816->54728 54817->54728 54818->54728 54819->54728 54820->54728 54821->54728 54822->54728 54823->54728 54824->54728 54826 42f0bb 467 API calls 54825->54826 54827 42f092 54826->54827 54828 40fb8e ctype VariantClear 54827->54828 54829 42b1c7 54828->54829 54829->54747 54829->54773 54830->54765 54831->54769 54832->54764 54833->54764 54834->54773 54835->54796 54837 40f5fa CharUpperBuffW 54836->54837 54838 40f5e6 54836->54838 54837->54838 54838->53115 54839->53122 54840->53122 54841 437c98 54842 4379ee 114 API calls 54841->54842 54843 437ca4 54842->54843 54844 437a84 158 API calls 54843->54844 54845 437cad 54844->54845 54846 4101fc VariantClear 54845->54846 54847 437ccb 54845->54847 54846->54847 54848 4307ff 54855 430850 54848->54855 54851 43081c 54852 418d3c 467 API calls 54853 43083d 54852->54853 54854 410048 77 API calls 54853->54854 54854->54851 54856 43085f _memset 54855->54856 54857 4308e7 54856->54857 54858 44e9ed 73 API calls 54856->54858 54860 405aa7 74 API calls 54857->54860 54859 4308b2 54858->54859 54863 430975 GetStdHandle 54859->54863 54864 43090e CreatePipe 54859->54864 54861 430b10 54860->54861 54862 40fc41 109 API calls 54861->54862 54874 430b17 _wcscpy 54862->54874 54867 430984 CreateFileW 54863->54867 54868 4309ad 54863->54868 54865 430925 54864->54865 54866 430928 GetCurrentProcess GetCurrentProcess DuplicateHandle 54864->54866 54865->54866 54869 43094b 54866->54869 54867->54868 54870 4309aa 54867->54870 54871 430a26 GetStdHandle 54868->54871 54872 4309bc CreatePipe 54868->54872 54869->54868 54873 430953 CloseHandle 54869->54873 54870->54868 54877 430a35 CreateFileW 54871->54877 54878 430a5e 54871->54878 54875 4309d6 54872->54875 54876 4309d9 GetCurrentProcess GetCurrentProcess DuplicateHandle 54872->54876 54873->54868 54879 405aa7 74 API calls 54874->54879 54898 430b3e _wcscpy 54874->54898 54875->54876 54880 4309fc 54876->54880 54877->54878 54883 430a5b 54877->54883 54884 430a67 CreatePipe 54878->54884 54885 430ace GetStdHandle 54878->54885 54886 430b37 54879->54886 54880->54878 54888 430a04 CloseHandle 54880->54888 54881 430b71 54889 430b87 54881->54889 54894 405aa7 74 API calls 54881->54894 54882 430b5f GetCurrentDirectoryW 54882->54881 54883->54878 54890 430a87 54884->54890 54891 430a8a GetCurrentProcess GetCurrentProcess DuplicateHandle 54884->54891 54885->54857 54887 430add CreateFileW 54885->54887 54892 40fc41 109 API calls 54886->54892 54887->54857 54893 430b03 54887->54893 54888->54878 54895 430c91 CreateProcessW 54889->54895 54896 430b97 54889->54896 54890->54891 54897 430aaa 54891->54897 54892->54898 54893->54857 54899 430b82 54894->54899 54900 430cb9 54895->54900 54948 433dda LoadLibraryA GetProcAddress 54896->54948 54897->54857 54902 430ab2 CloseHandle 54897->54902 54898->54881 54898->54882 54903 40fd19 95 API calls 54899->54903 54904 430d16 CloseHandle 54900->54904 54905 430cbd 54900->54905 54902->54857 54903->54889 54907 430d90 54904->54907 54908 430d24 54904->54908 54909 430cc6 54905->54909 54910 430cea 54905->54910 54906 430b9f 54911 430c6c 54906->54911 54924 430ba7 _memset 54906->54924 54939 430d8c 54907->54939 54954 40f437 CloseHandle CloseHandle CloseHandle CloseHandle 54907->54954 54913 430d30 CloseHandle 54908->54913 54914 430d39 54908->54914 54915 418b7f 75 API calls 54909->54915 54917 430cf5 GetLastError 54910->54917 54951 4187cb 115 API calls 4 library calls 54911->54951 54913->54914 54919 430d42 CloseHandle 54914->54919 54920 430d4b 54914->54920 54921 430cd1 54915->54921 54916 430dc1 54923 430d11 54916->54923 54927 430d08 54917->54927 54919->54920 54925 430d54 CloseHandle 54920->54925 54926 430d5d GetCurrentProcess GetCurrentProcess DuplicateHandle 54920->54926 54952 4189b9 115 API calls 3 library calls 54921->54952 54930 430818 54923->54930 54935 430df7 FreeLibrary 54923->54935 54932 40d6da 73 API calls 54924->54932 54925->54926 54953 433e09 73 API calls 54926->54953 54938 4101fc VariantClear 54927->54938 54928 430da2 54928->54939 54955 40f437 CloseHandle CloseHandle CloseHandle CloseHandle 54928->54955 54929 430c80 FreeLibrary 54929->54930 54930->54851 54930->54852 54931 430c7a 54931->54929 54931->54930 54936 430bee 54932->54936 54935->54930 54940 40d6da 73 API calls 54936->54940 54937 430de9 CloseHandle 54937->54923 54938->54923 54939->54916 54956 4102a8 VariantClear ctype 54939->54956 54942 430bfd 54940->54942 54942->54895 54949 433dda LoadLibraryA GetProcAddress 54942->54949 54944 430c16 54944->54895 54945 430c1a 54944->54945 54950 433dda LoadLibraryA GetProcAddress 54945->54950 54947 430c1f 54947->54900 54948->54906 54949->54944 54950->54947 54951->54931 54952->54931 54953->54939 54954->54928 54955->54939 54956->54937 54957 465ecb 54962 409b18 54957->54962 54961 465eda 54963 409b40 54962->54963 54964 40e2de 73 API calls 54963->54964 54966 409b4d _memset 54963->54966 54964->54963 54965 409ba3 54968 44f408 72 API calls __cinit 54965->54968 54966->54965 54967 409b7c CreateIcon 54966->54967 54967->54965 54968->54961 54969 45a04b 54970 45a087 54969->54970 55005 45a080 54969->55005 54971 45a0b2 54970->54971 54972 45a08b 54970->54972 54977 45a11c 54971->54977 54978 45a0f6 54971->54978 55044 45508f 65 API calls ___getgmtimebuf 54972->55044 54975 45a090 55045 45507c 65 API calls ___getgmtimebuf 54975->55045 54976 45a609 54979 45a131 54977->54979 54980 45a122 54977->54980 55047 45508f 65 API calls ___getgmtimebuf 54978->55047 55034 460f66 54979->55034 55050 460d86 67 API calls 3 library calls 54980->55050 54984 45a097 55046 45501d 65 API calls 2 library calls 54984->55046 54986 45a0fb 55048 45507c 65 API calls ___getgmtimebuf 54986->55048 54987 45a12e 54987->54979 54989 45a137 54991 45a336 54989->54991 55051 454bf1 54989->55051 54993 45a344 54991->54993 54994 45a569 WriteFile 54991->54994 54992 45a104 55049 45501d 65 API calls 2 library calls 54992->55049 54996 45a3e7 54993->54996 54997 45a356 54993->54997 54998 45a584 54994->54998 54999 45a590 GetLastError 54994->54999 55001 45a3f1 54996->55001 55008 45a48e 54996->55008 55002 45a5ca 54997->55002 55006 45a3a1 WriteFile 54997->55006 54998->55002 54998->55005 55015 45a5aa 54998->55015 54999->54998 55001->55002 55011 45a444 WriteFile 55001->55011 55002->55005 55059 45507c 65 API calls ___getgmtimebuf 55002->55059 55061 460147 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess __invoke_watson 55005->55061 55006->54999 55013 45a3c6 55006->55013 55008->55002 55014 45a4e4 WideCharToMultiByte 55008->55014 55009 45a184 GetConsoleCP 55009->54998 55028 45a1a4 55009->55028 55010 45a176 55010->54991 55010->55009 55011->54999 55017 45a469 55011->55017 55012 45a5b7 55060 45508f 65 API calls ___getgmtimebuf 55012->55060 55013->54997 55013->54998 55024 45a331 55013->55024 55014->54999 55016 45a517 WriteFile 55014->55016 55018 45a5b2 55015->55018 55019 45a5bf 55015->55019 55021 45a545 GetLastError 55016->55021 55026 45a53c 55016->55026 55017->54998 55017->55001 55017->55024 55057 45507c 65 API calls ___getgmtimebuf 55018->55057 55058 4550a2 65 API calls 3 library calls 55019->55058 55021->55026 55024->54998 55026->54998 55026->55008 55026->55016 55026->55024 55027 4610ed 77 API calls __write_nolock 55027->55028 55028->54998 55028->55024 55028->55027 55030 45a1ea 55028->55030 55056 44efb6 75 API calls __isleadbyte_l 55028->55056 55029 45a21c WideCharToMultiByte 55029->54998 55031 45a24a WriteFile 55029->55031 55030->54998 55030->54999 55030->55028 55030->55029 55032 462cbb 10 API calls __putwch_nolock 55030->55032 55033 45a283 WriteFile 55030->55033 55031->54999 55031->55030 55032->55030 55033->54999 55033->55030 55035 460f6f 55034->55035 55036 460f7d 55034->55036 55062 45507c 65 API calls ___getgmtimebuf 55035->55062 55039 460fa8 55036->55039 55063 45507c 65 API calls ___getgmtimebuf 55036->55063 55038 460f74 55038->54989 55039->54989 55041 460f91 55064 45501d 65 API calls 2 library calls 55041->55064 55044->54975 55045->54984 55047->54986 55048->54992 55050->54987 55052 454b7a ___getgmtimebuf 65 API calls 55051->55052 55053 454bf7 55052->55053 55055 454c04 GetConsoleMode 55053->55055 55065 44ea57 65 API calls 3 library calls 55053->55065 55055->54991 55055->55010 55056->55028 55057->55012 55058->55005 55059->55012 55060->55005 55061->54976 55062->55038 55063->55041 55065->55055 55066 465ee8 55071 4060c8 55066->55071 55070 465ef7 55072 4060d5 55071->55072 55073 44e9ed 73 API calls 55072->55073 55074 406152 GetModuleFileNameW 55073->55074 55075 4514e8 65 API calls 55074->55075 55076 406188 _wcsncat 55075->55076 55088 45156f 55076->55088 55079 44e9ed 73 API calls 55080 4061c1 _wcscpy 55079->55080 55081 4061f1 RegOpenKeyExW 55080->55081 55082 406216 RegQueryValueExW 55081->55082 55083 40632f 55081->55083 55084 406326 RegCloseKey 55082->55084 55085 406240 _wcscat _wcsncpy ___crtGetEnvironmentStringsW 55082->55085 55087 44f408 72 API calls __cinit 55083->55087 55084->55083 55085->55084 55086 44e9ed 73 API calls 55085->55086 55086->55085 55087->55070 55091 458159 55088->55091 55092 45816d 55091->55092 55093 458168 55091->55093 55100 45507c 65 API calls ___getgmtimebuf 55092->55100 55093->55092 55097 45818d 55093->55097 55096 4061b6 55096->55079 55097->55096 55102 45507c 65 API calls ___getgmtimebuf 55097->55102 55099 458172 55101 45501d 65 API calls 2 library calls 55099->55101 55100->55099 55102->55099 55103 42246d 55106 422477 55103->55106 55107 422487 55106->55107 55190 42799c 55107->55190 55110 4224d0 55112 405aa7 74 API calls 55110->55112 55111 405aa7 74 API calls 55113 4224cb 55111->55113 55114 422509 55112->55114 55115 40fd19 95 API calls 55113->55115 55116 40fc41 109 API calls 55114->55116 55115->55110 55117 422510 55116->55117 55194 422c6a 55117->55194 55124 422476 55125 42288b FreeLibrary 55125->55124 55126 422560 GetLastError 55184 422522 55126->55184 55127 42257a 55128 42271b LoadLibraryA 55127->55128 55131 422594 55127->55131 55129 422740 55128->55129 55130 42272e GetProcAddress 55128->55130 55134 405aa7 74 API calls 55129->55134 55130->55129 55244 4279c3 LoadLibraryA GetProcAddress 55131->55244 55133 4225af 55138 422624 55133->55138 55139 4225eb GetLastError 55133->55139 55135 422756 55134->55135 55136 40fc41 109 API calls 55135->55136 55137 42275d InternetOpenUrlW 55136->55137 55140 42276e GetLastError 55137->55140 55141 4227af 55137->55141 55245 4279f2 LoadLibraryA GetProcAddress 55138->55245 55143 422606 55139->55143 55142 42277e 55140->55142 55144 405aa7 74 API calls 55141->55144 55145 422790 55142->55145 55146 42278d FreeLibrary 55142->55146 55147 422612 55143->55147 55148 42260c FreeLibrary 55143->55148 55149 4227c0 55144->55149 55150 421ba8 4 API calls 55145->55150 55146->55145 55151 421ba8 4 API calls 55147->55151 55148->55147 55152 40fc41 109 API calls 55149->55152 55155 422799 55150->55155 55189 42261b 55151->55189 55156 4227c7 55152->55156 55154 422654 55160 42268a 55154->55160 55161 42265e GetLastError 55154->55161 55155->55124 55158 4227a4 FreeLibrary 55155->55158 55157 451cd9 162 API calls 55156->55157 55159 4227ce 55157->55159 55158->55124 55162 4227d6 GetLastError 55159->55162 55163 4227e8 55159->55163 55165 405aa7 74 API calls 55160->55165 55161->55143 55164 42267f FreeLibrary 55161->55164 55162->55142 55166 4227ed FreeLibrary 55163->55166 55181 4227f3 55163->55181 55164->55143 55167 42269b 55165->55167 55166->55181 55168 40fc41 109 API calls 55167->55168 55171 4226a2 55168->55171 55170 42799c 2 API calls 55170->55181 55172 451cd9 162 API calls 55171->55172 55175 4226a9 55172->55175 55173 422868 55178 4520b6 __fcloseall 104 API calls 55173->55178 55174 422827 InternetReadFile 55174->55173 55174->55181 55176 4226b3 GetLastError 55175->55176 55177 4226f8 55175->55177 55182 4226d4 FreeLibrary 55176->55182 55183 4226da 55176->55183 55179 422708 55177->55179 55180 4226fe FreeLibrary 55177->55180 55178->55184 55179->55166 55179->55181 55180->55179 55181->55170 55181->55173 55181->55174 55246 42289e FreeLibrary LoadLibraryA GetProcAddress 55181->55246 55247 451fc2 101 API calls 4 library calls 55181->55247 55182->55183 55186 4226e0 FreeLibrary 55183->55186 55187 4226e6 55183->55187 55233 421ba8 55184->55233 55186->55187 55188 421ba8 4 API calls 55187->55188 55188->55189 55189->55155 55191 4224a7 55190->55191 55192 4279a2 LoadLibraryA 55190->55192 55191->55110 55191->55111 55192->55191 55193 4279b3 GetProcAddress 55192->55193 55193->55191 55248 427a87 55194->55248 55197 422c89 55198 42251e 55197->55198 55199 422c8e FreeLibrary 55197->55199 55198->55184 55205 422d64 55198->55205 55199->55198 55200 427a87 2 API calls 55201 422ce9 ___crtGetEnvironmentStringsW 55200->55201 55202 422d02 InternetCrackUrlW 55201->55202 55202->55197 55203 422d11 _wcscat 55202->55203 55203->55198 55204 422d53 FreeLibrary 55203->55204 55204->55198 55206 427955 2 API calls 55205->55206 55211 422d7e 55206->55211 55207 422d82 55208 42255c 55207->55208 55209 422d88 FreeLibrary 55207->55209 55208->55126 55208->55127 55209->55208 55210 422da9 55211->55207 55211->55210 55252 427984 55211->55252 55214 422dfa LoadLibraryA 55215 422e1a GetProcAddress 55214->55215 55216 422e2a 55214->55216 55215->55216 55219 422e65 55216->55219 55255 427ab6 LoadLibraryA GetProcAddress 55216->55255 55218 422efd 55220 422f10 55218->55220 55221 422f0b FreeLibrary 55218->55221 55219->55218 55222 422eb3 55219->55222 55256 427ab6 LoadLibraryA GetProcAddress 55219->55256 55224 422f16 FreeLibrary 55220->55224 55225 422f1b 55220->55225 55221->55220 55222->55218 55258 427ab6 LoadLibraryA GetProcAddress 55222->55258 55224->55225 55228 422f21 FreeLibrary 55225->55228 55229 422f26 55225->55229 55227 422e99 55257 427ab6 LoadLibraryA GetProcAddress 55227->55257 55228->55229 55229->55208 55230 422ee3 55259 427ab6 LoadLibraryA GetProcAddress 55230->55259 55234 421bc1 55233->55234 55235 421be8 55234->55235 55260 4278f3 55234->55260 55237 4278f3 2 API calls 55235->55237 55240 421bf7 55235->55240 55237->55240 55238 421c09 55242 421c28 55238->55242 55243 421c1f FreeLibrary 55238->55243 55240->55238 55241 4278f3 2 API calls 55240->55241 55241->55238 55242->55124 55242->55125 55243->55242 55244->55133 55245->55154 55246->55181 55247->55181 55249 422c85 55248->55249 55250 427a8d LoadLibraryA 55248->55250 55249->55197 55249->55200 55250->55249 55251 427a9e GetProcAddress 55250->55251 55251->55249 55253 427955 2 API calls 55252->55253 55254 422df2 InternetOpenW 55253->55254 55254->55207 55254->55214 55255->55219 55256->55227 55257->55222 55258->55230 55259->55218 55261 421be0 InternetCloseHandle 55260->55261 55262 4278f9 LoadLibraryA 55260->55262 55261->55235 55262->55261 55263 42790a GetProcAddress 55262->55263 55263->55261 55264 424ead 55265 405aa7 74 API calls 55264->55265 55266 424ebb 55265->55266 55267 40fd19 95 API calls 55266->55267 55268 424ec0 55267->55268 55269 424ec4 Sleep 55268->55269 55270 424ece timeGetTime 55268->55270 55271 424f16 55269->55271 55272 405aa7 74 API calls 55270->55272 55273 424ee5 55272->55273 55274 40fd19 95 API calls 55273->55274 55275 424eea 55274->55275 55276 424f03 55275->55276 55277 424ef7 SetProcessWorkingSetSize 55275->55277 55278 418d3c 467 API calls 55276->55278 55277->55276 55278->55271

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 144 422477-4224c2 call 453ed0 call 42799c 149 4224c4-4224d3 call 405aa7 call 40fd19 144->149 150 4224dd-422520 call 405aa7 call 40fc41 call 422c6a 144->150 149->150 160 4224d5 149->160 162 422522-42252c 150->162 163 422531-42253a 150->163 160->150 164 42287b-42287f call 421ba8 162->164 165 42254c-42255e call 422d64 163->165 166 42253c-42253f 163->166 170 422884-422889 164->170 174 422560-422575 GetLastError 165->174 175 42257a-42257c 165->175 166->165 168 422541-422547 166->168 168->164 172 422895-42289b 170->172 173 42288b-42288f FreeLibrary 170->173 173->172 174->164 176 422582-422585 175->176 177 42271b-42272c LoadLibraryA 175->177 180 422587-42258e 176->180 181 422594-4225b5 call 4279c3 176->181 178 422740 177->178 179 42272e-42273e GetProcAddress 177->179 182 422745-42276c call 405aa7 call 40fc41 InternetOpenUrlW 178->182 179->178 179->182 180->177 180->181 186 4225b7 181->186 187 4225bc-4225e9 181->187 194 42276e-422774 GetLastError 182->194 195 4227af-4227d4 call 405aa7 call 40fc41 call 451cd9 182->195 186->187 192 422624-42262a 187->192 193 4225eb-4225fc GetLastError 187->193 199 422633 192->199 200 42262c-422631 192->200 197 422606-42260a 193->197 196 42277e-42278b 194->196 222 4227d6-4227e6 GetLastError 195->222 223 4227e8-4227ea 195->223 201 422790-422799 call 421ba8 196->201 202 42278d-42278e FreeLibrary 196->202 203 422612-42261f call 421ba8 197->203 204 42260c-422610 FreeLibrary 197->204 206 422638-42265c call 4279f2 199->206 200->206 215 42279e 201->215 202->201 203->215 204->203 220 42268a-4226b1 call 405aa7 call 40fc41 call 451cd9 206->220 221 42265e-42267d GetLastError 206->221 215->172 218 4227a4-4227aa FreeLibrary 215->218 218->172 246 4226b3-4226d2 GetLastError 220->246 247 4226f8-4226fc 220->247 221->197 226 42267f-422685 FreeLibrary 221->226 222->196 224 4227f3-4227f6 223->224 225 4227ec 223->225 229 4227fa-4227ff 224->229 228 4227ed FreeLibrary 225->228 226->197 228->224 231 422811-422820 call 42799c 229->231 232 422801-42280f call 42289e 229->232 241 422822 231->241 242 422827-42283e InternetReadFile 231->242 232->231 240 42286a 232->240 244 422874-42287a call 4520b6 240->244 241->242 242->240 245 422840-422845 242->245 244->164 245->244 251 422847-422866 call 451fc2 245->251 252 4226d4-4226d8 FreeLibrary 246->252 253 4226da-4226de 246->253 249 422708-42270c 247->249 250 4226fe-422702 FreeLibrary 247->250 249->224 255 422712-422716 249->255 250->249 251->229 261 422868 251->261 252->253 257 4226e0-4226e4 FreeLibrary 253->257 258 4226e6-4226f3 call 421ba8 253->258 255->228 257->258 258->215 261->244
                                                                            APIs
                                                                              • Part of subcall function 0042799C: LoadLibraryA.KERNEL32(Wininet.dll,?,?,004224A7), ref: 004279A7
                                                                              • Part of subcall function 0042799C: GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 004279B9
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 0042288F
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00422D64: FreeLibrary.KERNEL32(00000000), ref: 00422D8B
                                                                            • GetLastError.KERNEL32(?,00000000,?,?,?,?,?), ref: 00422560
                                                                            • GetLastError.KERNEL32 ref: 004225EB
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422610
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 004227A8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$ErrorLast$AddressLoadMessageProc
                                                                            • String ID: InternetOpenUrlW$Wininet.dll
                                                                            • API String ID: 2866533396-1201172734
                                                                            • Opcode ID: 1639af020b3ccf60068b8fbf7486d664327b795c502b41eafc1be8d237b6ff63
                                                                            • Instruction ID: 0b258b1817af18fe24c17d00a4c81d806bb1e3b45cad99637a574585516463cb
                                                                            • Opcode Fuzzy Hash: 1639af020b3ccf60068b8fbf7486d664327b795c502b41eafc1be8d237b6ff63
                                                                            • Instruction Fuzzy Hash: 9FB19D71608364AFD7119F65ED84A6FB7E4FB84308F40093FF84592261EBB89944CB9E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 512 40c78e-40c7f6 call 453ed0 call 40c4db * 2 call 40c5cd GetFileAttributesW 521 40c7f8-40c7fa 512->521 522 40c80c-40c819 GetFileAttributesW 512->522 521->522 523 40c7fc-40c80b call 44e949 521->523 524 40c81b-40c81d 522->524 525 40c82f-40c881 call 4514e8 FindFirstFileW 522->525 523->522 524->525 527 40c81f-40c82e call 44e949 524->527 532 40c9c7-40c9d1 FindClose 525->532 533 40c887 525->533 527->525 535 40c9d3-40c9d9 532->535 536 40c88d-40c892 533->536 536->532 537 40c898-40c8a0 536->537 538 40c9a2-40c9b6 FindNextFileW 537->538 539 40c8a6-40c915 call 40c9da call 44e973 call 44e949 * 2 call 40c488 537->539 538->536 541 40c9bc-40c9c0 538->541 551 40c917-40c91b 539->551 552 40c938-40c943 539->552 541->536 553 40c983-40c98f FindClose 551->553 554 40c91d-40c930 lstrcmpiW 551->554 555 40c975-40c97d CopyFileW 552->555 556 40c945-40c94a 552->556 553->535 557 40c991-40c99e MoveFileW 554->557 558 40c932 DeleteFileW 554->558 561 40c97f-40c981 555->561 559 40c95a-40c966 CopyFileW 556->559 560 40c94c-40c958 MoveFileW 556->560 563 40c9a0 557->563 564 40c9c5 557->564 558->552 559->553 562 40c968-40c973 DeleteFileW 559->562 560->561 561->553 561->563 562->561 563->538 564->532
                                                                            APIs
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\regsvr.exe,00000104,0048D8B0,C:\Users\user\Desktop\regsvr.exe,?,?,00406C7E,C:\Users\user\Desktop\regsvr.exe,00000104), ref: 0040C4F9
                                                                              • Part of subcall function 0040C5CD: __wcsicmp.LIBCMT ref: 0040C664
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040C7EC
                                                                            • _wcscat.LIBCMT ref: 0040C805
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040C814
                                                                            • _wcscat.LIBCMT ref: 0040C828
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0040C86F
                                                                            • _wcscpy.LIBCMT ref: 0040C8DF
                                                                            • _wcscat.LIBCMT ref: 0040C8F1
                                                                            • _wcscat.LIBCMT ref: 0040C903
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 0040C925
                                                                            • DeleteFileW.KERNEL32(?), ref: 0040C932
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0040C952
                                                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0040C962
                                                                            • DeleteFileW.KERNEL32(?), ref: 0040C96D
                                                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0040C97D
                                                                            • FindClose.KERNEL32(?), ref: 0040C987
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0040C996
                                                                            • FindNextFileW.KERNEL32(?,00000010), ref: 0040C9AE
                                                                            • FindClose.KERNEL32(?), ref: 0040C9CB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find_wcscat$AttributesCloseCopyDeleteMove$FirstFullNameNextPath__wcsicmp_wcscpylstrcmpi
                                                                            • String ID: \*.*
                                                                            • API String ID: 768025798-1173974218
                                                                            • Opcode ID: 10b2d1794f889928ce0e0e9e551be00faccc2560a39368bc2c4d36c533d22c20
                                                                            • Instruction ID: ac382173c2676c855cfac5d4542afd1b052519be0a49c5268b83ac1b6772a6c9
                                                                            • Opcode Fuzzy Hash: 10b2d1794f889928ce0e0e9e551be00faccc2560a39368bc2c4d36c533d22c20
                                                                            • Instruction Fuzzy Hash: E45184B2008345AAD721DFA1DC89EDF77ECAB45314F040A2FF585D2191EB38D548C7AA

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1162 40108c-4010c2 GetCurrentDirectoryW call 4013fe call 40e2b5 1167 4010c4-4010d8 MessageBoxA 1162->1167 1168 4010dd-4010e9 1162->1168 1169 4012b3-4012b7 1167->1169 1170 40110b-40111b call 406bfc 1168->1170 1171 4010eb-401109 call 4065b2 1168->1171 1175 401120-401122 1170->1175 1178 401159-401167 call 418bd1 1171->1178 1176 401133-401153 GetFullPathNameW 1175->1176 1177 401124-40112e 1175->1177 1176->1178 1179 4012a6-4012ad SetCurrentDirectoryW 1177->1179 1182 401169-40118a call 40677e SetCurrentDirectoryW 1178->1182 1183 40118f-401193 1178->1183 1179->1169 1182->1169 1185 401241-401252 call 4012ba call 40138d 1183->1185 1186 401199-4011a0 1183->1186 1196 401254-401259 call 409f5a 1185->1196 1197 40125e-401265 call 418d3c 1185->1197 1186->1185 1189 4011a6-4011ad call 40d99a 1186->1189 1189->1185 1195 4011b3-4011c7 GetModuleFileNameW 1189->1195 1198 4011c9-401215 call 40e30a call 40e505 * 2 GetForegroundWindow ShellExecuteW call 44e722 1195->1198 1199 40121a-40123f GetForegroundWindow ShellExecuteW 1195->1199 1196->1197 1205 40126a-401271 1197->1205 1201 40129c-4012a1 call 40677e 1198->1201 1199->1201 1201->1179 1205->1201 1208 401273 1205->1208 1210 401278-40127c 1208->1210 1212 401291-40129a 1210->1212 1213 40127e-401290 call 44e722 * 2 1210->1213 1212->1201 1212->1210 1213->1212
                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 004010AD
                                                                              • Part of subcall function 004013FE: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\regsvr.exe,00000104,?,00000104), ref: 0040143E
                                                                              • Part of subcall function 004013FE: __wcsicmp.LIBCMT ref: 00401546
                                                                              • Part of subcall function 0040E2B5: GetModuleHandleA.KERNEL32(kernel32.dll,004010C0,?), ref: 0040E2BA
                                                                              • Part of subcall function 0040E2B5: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 0040E2CA
                                                                            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,0046BD8E,00000010), ref: 004010D2
                                                                            • SetCurrentDirectoryW.KERNEL32(?,C:\Users\user\Desktop\regsvr.exe), ref: 0040117A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryModule$AddressFileHandleMessageNameProc__wcsicmp
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                            • API String ID: 100587416-3456153593
                                                                            • Opcode ID: bbcb086491826c9c086e2e5048280d0f062283ebc6428eca5842b34c6c0e4702
                                                                            • Instruction ID: a517a9db5f85c4c96bb8fc9c2871e4bd747f39243f1e7ce5074cf97865ffdd83
                                                                            • Opcode Fuzzy Hash: bbcb086491826c9c086e2e5048280d0f062283ebc6428eca5842b34c6c0e4702
                                                                            • Instruction Fuzzy Hash: 83510471904254AAEB10BBA59C05FAE7B78EB45308F0404BFF501B61E2D7BC89858B6E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1440 41de3c-41de64 FindFirstFileW 1441 41de71 1440->1441 1442 41de66 1440->1442 1444 41de77-41de8a call 44ef27 1441->1444 1443 41de68-41de6e 1442->1443 1447 41dec6-41ded0 FindNextFileW 1444->1447 1448 41de8c-41de9f call 44ef27 1444->1448 1447->1444 1449 41ded2-41dedf FindClose 1447->1449 1448->1447 1456 41dea1-41dec4 GetFileAttributesW SetFileAttributesW 1448->1456 1451 41def1-41df04 FindFirstFileW 1449->1451 1452 41dee1-41dee3 1449->1452 1454 41df73-41df75 1451->1454 1455 41df06 1451->1455 1452->1443 1457 41df79-41df7f FindClose 1454->1457 1458 41df0c-41df11 1455->1458 1456->1447 1459 41dee5-41deec FindClose 1456->1459 1460 41df13-41df26 call 44ef27 1458->1460 1461 41df64-41df71 FindNextFileW 1458->1461 1459->1442 1460->1461 1464 41df28-41df3b call 44ef27 1460->1464 1461->1454 1461->1458 1464->1461 1467 41df3d-41df5b SetCurrentDirectoryW call 41de3c 1464->1467 1470 41df77 1467->1470 1471 41df5d-41df62 SetCurrentDirectoryW 1467->1471 1470->1457 1471->1461
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000003,?,75918FB0,75923340,00000000), ref: 0041DE5D
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0041DEA6
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 0041DEBC
                                                                            • FindNextFileW.KERNELBASE(00000000,?), ref: 0041DECC
                                                                            • FindClose.KERNEL32(00000000), ref: 0041DED9
                                                                            • FindClose.KERNEL32(00000000), ref: 0041DEE6
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0041DEFB
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041DF42
                                                                              • Part of subcall function 0041DE3C: SetCurrentDirectoryW.KERNEL32(0046FAA8,00000003,00000000,?,00000000), ref: 0041DF62
                                                                            • FindNextFileW.KERNEL32(?,00000010), ref: 0041DF6D
                                                                            • FindClose.KERNEL32(?), ref: 0041DF7D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                            • String ID: *.*
                                                                            • API String ID: 1409584000-438819550
                                                                            • Opcode ID: 10bb8065325b9965cb294d6f61081a68c99e569a702118bdb6baabe53864fc73
                                                                            • Instruction ID: a4d2aa76a43ea5969c1a1a81fb0d8a6e3f8afc9f3cd91bb763ce84b1788f51b6
                                                                            • Opcode Fuzzy Hash: 10bb8065325b9965cb294d6f61081a68c99e569a702118bdb6baabe53864fc73
                                                                            • Instruction Fuzzy Hash: 2F31E4B290C305AADB00DFA0DC419EF77ECAF56315F10052BF990C3291E739E9498B9A

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1570 4053ef-40543d GetVersionExW call 44f00e 1573 405443-4054e1 1570->1573 1574 405546-405549 1570->1574 1577 4054e7-4054f3 1573->1577 1578 40561f-40563c 1573->1578 1575 405536-405541 1574->1575 1576 40554b-40554f 1574->1576 1575->1576 1585 405543 1575->1585 1579 405561-405573 call 44e973 1576->1579 1580 405551-40555a 1576->1580 1583 4054f9-4054fa 1577->1583 1584 40560f-40561d 1577->1584 1581 40563e-405641 1578->1581 1582 40566f 1578->1582 1604 405579-40557c 1579->1604 1580->1579 1587 40555c-40555f 1580->1587 1588 405643-405646 1581->1588 1589 40565f-40566d 1581->1589 1586 405676-40568a LoadLibraryA 1582->1586 1591 405500-405501 1583->1591 1592 4055ab-4055b7 1583->1592 1584->1586 1585->1574 1595 40568c-40569c GetProcAddress 1586->1595 1596 40569e 1586->1596 1587->1579 1587->1580 1588->1586 1593 405648-40565d 1588->1593 1589->1586 1591->1586 1599 405507-405513 1591->1599 1597 4055b9-4055c7 1592->1597 1598 4055cc-4055cf 1592->1598 1593->1586 1595->1596 1600 4056a3-4056b4 GetCurrentProcess 1595->1600 1596->1600 1597->1586 1601 4055d1-4055e3 1598->1601 1602 4055e8-4055eb 1598->1602 1603 405515-405531 1599->1603 1599->1604 1608 4056b6 1600->1608 1609 4056bd-4056d6 1600->1609 1601->1586 1602->1586 1606 4055f1-40560d 1602->1606 1603->1586 1604->1586 1605 405582-4055a6 1604->1605 1605->1586 1606->1586 1608->1609 1610 4056d8-4056e8 call 40576f 1609->1610 1611 40570e-405712 GetSystemInfo 1609->1611 1617 405701-405705 1610->1617 1618 4056ea-4056f4 call 40576f 1610->1618 1612 405718-40571f 1611->1612 1615 405721-40572b 1612->1615 1616 40572d-405731 1612->1616 1619 40575c-405760 1615->1619 1620 405733-40573d 1616->1620 1621 40573f-405743 1616->1621 1617->1612 1625 405707-40570c FreeLibrary 1617->1625 1629 4056f6 1618->1629 1630 4056fb-4056ff GetNativeSystemInfo 1618->1630 1622 405762-405765 FreeLibrary 1619->1622 1623 405767-40576e 1619->1623 1620->1619 1626 405751-405756 1621->1626 1627 405745-40574f 1621->1627 1622->1623 1625->1612 1626->1619 1627->1619 1629->1630 1630->1617
                                                                            APIs
                                                                            • GetVersionExW.KERNEL32(?,00000000), ref: 0040540C
                                                                            • _wcscpy.LIBCMT ref: 0040556D
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?), ref: 0040567F
                                                                            • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00405692
                                                                            • GetCurrentProcess.KERNEL32(?), ref: 004056A7
                                                                            • GetNativeSystemInfo.KERNEL32(?), ref: 004056FF
                                                                            • FreeLibrary.KERNEL32(?), ref: 0040570A
                                                                            • GetSystemInfo.KERNEL32(?), ref: 00405712
                                                                            • FreeLibrary.KERNEL32(?), ref: 00405765
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$FreeInfoSystem$AddressCurrentLoadNativeProcProcessVersion_wcscpy
                                                                            • String ID: IsWow64Process$kernel32.dll
                                                                            • API String ID: 2152952469-3024904723
                                                                            • Opcode ID: b4ea03b83d01c2e64632bef0b81f658f78af1d8375097a5454cf352bb8aadb72
                                                                            • Instruction ID: 55887c8e518e006de204ccda2b1b86d7e9ce9c3f371ea8eba2cdefb3dc4dd345
                                                                            • Opcode Fuzzy Hash: b4ea03b83d01c2e64632bef0b81f658f78af1d8375097a5454cf352bb8aadb72
                                                                            • Instruction Fuzzy Hash: C5A12130448688C9DF119F68C58C7D63F959B21308F5C44FADC499F29BD3BA8589CBB6
                                                                            APIs
                                                                              • Part of subcall function 0040D9E9: LoadLibraryA.KERNEL32(kernel32.dll,0040BCD1,75920F00,0048BA08), ref: 0040D9F4
                                                                              • Part of subcall function 0040D9E9: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0040DA06
                                                                            • FreeLibrary.KERNEL32(00418DD9,75920F00,0048BA08), ref: 0040BE45
                                                                              • Part of subcall function 0040DA18: LoadLibraryA.KERNEL32(kernel32.dll,0040BCE1,75920F00,0048BA08), ref: 0040DA23
                                                                              • Part of subcall function 0040DA18: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 0040DA35
                                                                            • FreeLibrary.KERNEL32(00000000,75920F00,0048BA08), ref: 0040BE37
                                                                              • Part of subcall function 0040DA47: LoadLibraryA.KERNEL32(kernel32.dll,0040BCF1,75920F00,0048BA08), ref: 0040DA52
                                                                              • Part of subcall function 0040DA47: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 0040DA64
                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,75920F00,0048BA08), ref: 0040BD1A
                                                                            • Process32FirstW.KERNEL32(?,0000022C), ref: 0040BD3D
                                                                            • Process32NextW.KERNEL32(?,0000022C), ref: 0040BD70
                                                                            • _wcscat.LIBCMT ref: 0040BDAD
                                                                            • __wcsicmp.LIBCMT ref: 0040BDBC
                                                                            • CloseHandle.KERNEL32(?), ref: 0040BDF3
                                                                            • FreeLibrary.KERNEL32(0041902D), ref: 0040BE07
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 0040BE11
                                                                            • FreeLibrary.KERNEL32(00418DD9), ref: 0040BE1B
                                                                            • FreeLibrary.KERNEL32(0041902D,75920F00,0048BA08), ref: 0040BE29
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$AddressLoadProc$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicmp_wcscat
                                                                            • String ID:
                                                                            • API String ID: 106133192-0
                                                                            • Opcode ID: 309f1983b0d1d7e16c2b1b6799748829eb26840d23cc78156816468137cc015a
                                                                            • Instruction ID: fa0bb9f8add545e666743b8d05504188b17dc158f43c9a4505aa3be8f7021ede
                                                                            • Opcode Fuzzy Hash: 309f1983b0d1d7e16c2b1b6799748829eb26840d23cc78156816468137cc015a
                                                                            • Instruction Fuzzy Hash: 1A510672C00219ABCF11AFA5CC449EEB7B8FF48304F5084BAE514B2291D7395E45DFA9
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040C4AC
                                                                            • FindFirstFileW.KERNEL32(?,00000000), ref: 0040C4BE
                                                                            • FindClose.KERNEL32(00000000), ref: 0040C4CE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$AttributesCloseFirst
                                                                            • String ID: *p@
                                                                            • API String ID: 48322524-2474123842
                                                                            • Opcode ID: 0941a96f2b4e133539b3baa8ee8f6d7ade120b6096835f9915711223bd9d8400
                                                                            • Instruction ID: 943425797427cd944ec2477e11eb90c7ac2384fd5af1d53218e0603e71938972
                                                                            • Opcode Fuzzy Hash: 0941a96f2b4e133539b3baa8ee8f6d7ade120b6096835f9915711223bd9d8400
                                                                            • Instruction Fuzzy Hash: 8BE04F31808404ABCB106F74EC884B97B69AB06335F104B32FEB5D12F0E7759950958A
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000003), ref: 00418BA3
                                                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000003), ref: 00418BB5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: 3e86870cb8cf007079cae3968f33e62dd157cf953cbb657e99254de906b7a85f
                                                                            • Instruction ID: 467baf8bf01b25525d585cab7db777dbe93ca1f360f42ccb9431c17a33480558
                                                                            • Opcode Fuzzy Hash: 3e86870cb8cf007079cae3968f33e62dd157cf953cbb657e99254de906b7a85f
                                                                            • Instruction Fuzzy Hash: E9E02B3110822DBBDB105B958C09FDB775CEF053A5F00403AF918A22C1D674A941CBB5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_strcat
                                                                            • String ID:
                                                                            • API String ID: 1783402425-0
                                                                            • Opcode ID: e18b76ced0fac1fa3dd8379dba5be37faead6896194f24653fd9befda51f0ffd
                                                                            • Instruction ID: f4bed3256a820badb101227a0947acf1ba754944e69c511bfec78f6e62ce8c00
                                                                            • Opcode Fuzzy Hash: e18b76ced0fac1fa3dd8379dba5be37faead6896194f24653fd9befda51f0ffd
                                                                            • Instruction Fuzzy Hash: B4224970608311DFC714EF65D88596AB7E0BF84314F50882EF89597262CB38E999CF5B

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 430850-4308a6 call 453ed0 call 451260 5 4308e7-4308ea 0->5 6 4308a8-4308b5 call 44e9ed 0->6 7 430b06-430b2a call 405aa7 call 40fc41 call 44e973 5->7 11 4308b7-4308e5 6->11 12 4308ef-4308f2 6->12 32 430b4f 7->32 33 430b2c-430b4d call 405aa7 call 40fc41 call 44e973 7->33 14 4308f4-43090c 11->14 12->14 16 430975-430982 GetStdHandle 14->16 17 43090e-430923 CreatePipe 14->17 22 430984-4309a8 CreateFileW 16->22 23 4309ad 16->23 19 430925 17->19 20 430928-430949 GetCurrentProcess * 2 DuplicateHandle 17->20 19->20 24 43094b 20->24 25 43094e-430951 20->25 22->23 27 4309aa 22->27 28 4309b3-4309ba 23->28 24->25 25->28 31 430953-430973 CloseHandle 25->31 27->23 29 430a26-430a33 GetStdHandle 28->29 30 4309bc-4309d4 CreatePipe 28->30 37 430a35-430a59 CreateFileW 29->37 38 430a5e-430a65 29->38 34 4309d6 30->34 35 4309d9-4309fa GetCurrentProcess * 2 DuplicateHandle 30->35 31->28 36 430b56-430b5d 32->36 33->36 34->35 40 4309ff-430a02 35->40 41 4309fc 35->41 42 430b71-430b75 36->42 43 430b5f-430b6b GetCurrentDirectoryW 36->43 37->38 44 430a5b 37->44 45 430a67-430a85 CreatePipe 38->45 46 430ace-430adb GetStdHandle 38->46 40->38 49 430a04-430a24 CloseHandle 40->49 41->40 50 430b77-430b87 call 405aa7 call 40fd19 42->50 51 430b8b-430b91 42->51 43->42 44->38 52 430a87 45->52 53 430a8a-430aa8 GetCurrentProcess * 2 DuplicateHandle 45->53 46->7 48 430add-430b01 CreateFileW 46->48 48->7 55 430b03 48->55 49->38 50->51 57 430c91-430cb7 CreateProcessW 51->57 58 430b97-430ba1 call 433dda 51->58 52->53 59 430aaa 53->59 60 430aad-430ab0 53->60 55->7 63 430cb9-430cbb 57->63 77 430ba7-430bdd call 451260 58->77 78 430c6c-430c75 call 4187cb 58->78 59->60 60->7 65 430ab2-430acc CloseHandle 60->65 69 430d16-430d22 CloseHandle 63->69 70 430cbd-430cc4 63->70 65->7 73 430d90-430d98 69->73 74 430d24-430d2e 69->74 75 430cc6-430ce8 call 418b7f call 4189b9 call 44e722 70->75 76 430cea-430d11 call 41a11e GetLastError call 41a14b call 4101fc 70->76 80 430dbb-430dbf 73->80 81 430d9a-430da4 call 40f437 73->81 83 430d30-430d33 CloseHandle 74->83 84 430d39-430d40 74->84 92 430c7a-430c7e 75->92 97 430df2-430df5 76->97 98 430be2-430c08 call 40d6da * 2 77->98 99 430bdf 77->99 78->92 87 430dc1-430dca 80->87 88 430dcc-430dd4 80->88 81->80 115 430da6-430dab 81->115 83->84 93 430d42-430d45 CloseHandle 84->93 94 430d4b-430d52 84->94 87->97 102 430dd6 88->102 103 430ddc-430dec call 4102a8 CloseHandle 88->103 106 430c80-430c83 FreeLibrary 92->106 107 430c89-430c8c 92->107 93->94 100 430d54-430d57 CloseHandle 94->100 101 430d5d-430d8e GetCurrentProcess * 2 DuplicateHandle call 433e09 94->101 112 430e00 97->112 113 430df7-430dfa FreeLibrary 97->113 98->57 131 430c0e-430c18 call 433dda 98->131 99->98 100->101 101->80 102->103 103->97 106->107 116 430e02-430e08 107->116 112->116 113->112 122 430db2-430dba call 44e722 115->122 123 430dad call 40f437 115->123 122->80 123->122 131->57 134 430c1a-430c24 call 433dda 131->134 137 430c26 134->137 138 430c2b-430c6a call 44e722 * 2 134->138 137->138 138->63
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0043087B
                                                                            • CreatePipe.KERNEL32(00000004,00000008,?,00000000), ref: 0043091B
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00430933
                                                                            • GetCurrentProcess.KERNEL32(?,00000000), ref: 0043093E
                                                                            • DuplicateHandle.KERNEL32(00000000), ref: 00430941
                                                                            • CloseHandle.KERNEL32(?), ref: 0043095B
                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00430977
                                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,?,00000003,00000080,00000000), ref: 0043099C
                                                                            • CreatePipe.KERNEL32(?,?,?,00000000), ref: 004309CC
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 004309E4
                                                                            • GetCurrentProcess.KERNEL32(?,00000000), ref: 004309EF
                                                                            • DuplicateHandle.KERNEL32(00000000), ref: 004309F2
                                                                            • CloseHandle.KERNEL32(?), ref: 00430A0C
                                                                            • GetStdHandle.KERNEL32(000000F4), ref: 00430A28
                                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,?,00000003,00000080,00000000), ref: 00430A4D
                                                                            • CreatePipe.KERNEL32(?,?,?,00000000), ref: 00430A7D
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00430A95
                                                                            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00430A9D
                                                                            • DuplicateHandle.KERNEL32(00000000), ref: 00430AA0
                                                                            • CloseHandle.KERNEL32(?), ref: 00430AB7
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00430AD0
                                                                            • CreateFileW.KERNEL32(nul,80000000,00000001,?,00000003,00000080,00000000), ref: 00430AF5
                                                                            • _wcscpy.LIBCMT ref: 00430B1F
                                                                            • _wcscpy.LIBCMT ref: 00430B46
                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 00430B6B
                                                                            • _memset.LIBCMT ref: 00430BB0
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • FreeLibrary.KERNEL32(?,00000087,00000000,?,000000FF), ref: 00430C83
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,00000000,00000000,?,?,?), ref: 00430CB1
                                                                            • GetLastError.KERNEL32(00000000), ref: 00430CF5
                                                                            • CloseHandle.KERNEL32(?), ref: 00430D19
                                                                            • CloseHandle.KERNEL32(00000004), ref: 00430D33
                                                                            • CloseHandle.KERNEL32(?), ref: 00430D45
                                                                            • CloseHandle.KERNEL32(?), ref: 00430D57
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 00430D71
                                                                            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00430D77
                                                                            • DuplicateHandle.KERNEL32(00000000), ref: 00430D7A
                                                                            • CloseHandle.KERNEL32(?), ref: 00430DEC
                                                                            • FreeLibrary.KERNEL32(?), ref: 00430DFA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Handle$CurrentProcess$Close$Create$Duplicate$FilePipe$FreeLibrary_memset_wcscpy$DirectoryErrorLast_malloc
                                                                            • String ID: nul
                                                                            • API String ID: 3280770425-2873401336
                                                                            • Opcode ID: 13c03301f670196446dbc29c957dbf2750b6201ee8d2ff05c5243bed1a7e85fe
                                                                            • Instruction ID: 1e5b9749e3666ced2f883344952439004967d82c66297152457089bb690e1251
                                                                            • Opcode Fuzzy Hash: 13c03301f670196446dbc29c957dbf2750b6201ee8d2ff05c5243bed1a7e85fe
                                                                            • Instruction Fuzzy Hash: AE02D1B1504249AFDB10DFA5CC95ADE7BA8FF08308F04426AF91997291D778EC44CF59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 263 412c71-412cc2 call 453ed0 call 411ac9 call 41288d call 451d73 call 4130ce 274 412cc4 263->274 275 412ccc-412db0 call 4523ce * 8 GetTempPathW GetTempFileNameW call 451cd9 263->275 276 412cc6-412cc7 274->276 296 412db2-412db4 275->296 297 412db9-412dd3 call 4129cd 275->297 278 412f56-412f5b 276->278 296->276 300 412e67-412e79 call 4520b6 297->300 301 412dd9 297->301 308 412e93-412e98 300->308 309 412e7b 300->309 302 412ddf-412dea 301->302 304 412df4 302->304 305 412dec-412df2 302->305 307 412df9-412e16 call 4523ce 304->307 305->307 318 412e18-412e2c call 41299f 307->318 319 412e2e-412e5f call 411a75 call 451fc2 307->319 312 412ef0-412f04 CopyFileW 308->312 313 412e9a-412eea call 411ac9 call 44e973 * 2 call 411af7 308->313 310 412e7d-412e8e DeleteFileW 309->310 310->278 315 412f06-412f08 312->315 316 412f0d-412f39 DeleteFileW CreateFileW 312->316 313->316 337 412eec-412eee 313->337 315->310 321 412f54 316->321 322 412f3b-412f4e SetFileTime CloseHandle 316->322 318->319 334 412e65 319->334 335 412ddb 319->335 321->278 322->321 334->300 335->302 337->310
                                                                            APIs
                                                                              • Part of subcall function 0041288D: __time64.LIBCMT ref: 00412897
                                                                            • _fseek.LIBCMT ref: 00412CA6
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 004130E7
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 00413125
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 00413142
                                                                              • Part of subcall function 004130CE: _wcscpy.LIBCMT ref: 00413175
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 00413184
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 004131A1
                                                                              • Part of subcall function 004130CE: _wcscpy.LIBCMT ref: 004131D0
                                                                              • Part of subcall function 004130CE: _fseek.LIBCMT ref: 004131F2
                                                                            • __fread_nolock.LIBCMT ref: 00412CD5
                                                                            • __fread_nolock.LIBCMT ref: 00412CE6
                                                                            • __fread_nolock.LIBCMT ref: 00412D03
                                                                            • __fread_nolock.LIBCMT ref: 00412D12
                                                                            • __fread_nolock.LIBCMT ref: 00412D31
                                                                            • __fread_nolock.LIBCMT ref: 00412D40
                                                                            • __fread_nolock.LIBCMT ref: 00412D4F
                                                                            • __fread_nolock.LIBCMT ref: 00412D5E
                                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00412D73
                                                                            • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00412D90
                                                                            • __fread_nolock.LIBCMT ref: 00412E0A
                                                                            • DeleteFileW.KERNEL32(?), ref: 00412E86
                                                                            • _wcscpy.LIBCMT ref: 00412EC4
                                                                            • _wcscpy.LIBCMT ref: 00412ED4
                                                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00412EFC
                                                                            • DeleteFileW.KERNEL32(?), ref: 00412F15
                                                                            • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00412F2E
                                                                            • SetFileTime.KERNEL32(00000000,?,00000000,?), ref: 00412F47
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00412F4E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock$File$_wcscpy$DeleteTemp_fseek$CloseCopyCreateHandleNamePathTime__time64
                                                                            • String ID: aut
                                                                            • API String ID: 4271773709-3010740371
                                                                            • Opcode ID: f1460ff563875310647a6a6e8609410c8352aebd63edaa18295b8f75108ff7ea
                                                                            • Instruction ID: 5965db3f211466000438e1ca9a14de579336b4291dc07ba067f484b4a889039f
                                                                            • Opcode Fuzzy Hash: f1460ff563875310647a6a6e8609410c8352aebd63edaa18295b8f75108ff7ea
                                                                            • Instruction Fuzzy Hash: 5C81B072508344ABDB219B61CD45FDF7BACEF85304F00081BF688E6191D7B89598CB6A

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 338 434645-434680 call 453ed0 call 40e2de * 3 347 434682-434685 338->347 348 43468e-4346d6 call 405aa7 call 40fc41 call 40e30a call 433eaa call 40e37d call 433f9a 338->348 347->348 349 434687-434689 347->349 371 4346e7-4346ec 348->371 372 4346d8-4346e5 call 41a11e 348->372 352 434a29-434a2c call 4101fc 349->352 356 434a31-434a52 call 44e722 * 3 352->356 374 434718 371->374 375 4346ee-434700 RegConnectRegistryW 371->375 372->349 378 43471b-434741 RegCreateKeyExW 374->378 376 434713-434716 375->376 377 434702-43470e call 41a11e 375->377 376->378 388 434a28 377->388 381 434743-43475b call 41a11e call 4101fc 378->381 382 43476f-434773 378->382 381->356 396 434761-43476a RegCloseKey 381->396 385 434793-4347b5 call 405aa7 call 40fc41 call 44e8b8 382->385 386 434775-434783 RegCloseKey 382->386 399 4347b7-4347e8 call 405aa7 call 40fc41 call 44f00e call 405aa7 call 40fc41 385->399 400 434818-434838 call 405aa7 call 40fc41 call 44e8b8 385->400 386->356 390 434789-43478e RegCloseKey 386->390 388->352 390->356 396->356 425 4347e9-434804 call 405aa7 call 40fc41 RegSetValueExW 399->425 413 434870-434890 call 405aa7 call 40fc41 call 44e8b8 400->413 414 43483a-43486b call 405aa7 call 40fc41 call 44f00e call 405aa7 call 40fc41 400->414 434 434892-4348dd call 405aa7 call 40fc41 call 45158d call 44f00e 413->434 435 43490b-43492b call 405aa7 call 40fc41 call 44e8b8 413->435 414->425 425->386 444 43480a-434813 call 4101fc 425->444 464 4348f6 434->464 465 4348df-4348ea 434->465 458 43494a-434968 call 405aa7 call 40fc41 call 44e8b8 435->458 459 43492d-434943 call 405aa7 call 40fd19 435->459 444->386 478 434a13-434a21 RegCloseKey 458->478 479 43496e-434982 call 405aa7 458->479 459->458 467 4348fa-434904 464->467 468 4348f8-4348f9 464->468 470 4348ef-4348f2 465->470 471 4348ec 465->471 467->435 468->467 470->465 474 4348f4 470->474 471->470 474->464 478->388 481 434a23-434a26 RegCloseKey 478->481 483 4349a6-4349b7 call 405aa7 call 41a2e1 479->483 484 434984-4349a0 call 405aa7 call 40fc06 call 405aa7 call 40fc83 479->484 481->388 493 434a02-434a0b call 4101fc 483->493 494 4349b9-4349db call 405aa7 call 40fc41 call 40dc56 483->494 484->483 493->478 494->493 507 4349dd-4349fb call 405aa7 call 41a2e1 494->507 507->493
                                                                            APIs
                                                                            • RegConnectRegistryW.ADVAPI32(?,00000000,00000000), ref: 004346F8
                                                                            • RegCreateKeyExW.KERNEL32(00000000,?,00000000,0046BF68,00000000,?,00000000,?,?), ref: 00434739
                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00434764
                                                                            • RegCloseKey.KERNEL32(?), ref: 0043477E
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0043478C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectCreateRegistry
                                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ
                                                                            • API String ID: 3641090821-2346799943
                                                                            • Opcode ID: 6748d82ebc539e92e4411bbdc198434ab96816bb1679d5c102ac9d8c26c2f993
                                                                            • Instruction ID: 63ad986f57a684181669bbd1c66e7d09d92ed7f764fe6cec599199ab264e71ae
                                                                            • Opcode Fuzzy Hash: 6748d82ebc539e92e4411bbdc198434ab96816bb1679d5c102ac9d8c26c2f993
                                                                            • Instruction Fuzzy Hash: 43B1A332A442046AEF25BBB29C46EEF6369AF44319F10053FF901F71D2DB7CA9448A59
                                                                            APIs
                                                                            • __invoke_watson.LIBCMT ref: 00462389
                                                                            • __invoke_watson.LIBCMT ref: 004623A4
                                                                            • CreateFileW.KERNEL32(00000080,?,00000080,0000000C,00000001,00000080,00000000,?,00000000,00000109), ref: 0046258D
                                                                            • CreateFileW.KERNEL32(00000080,7FFFFFFF,00000001,0000000C,00000001,00000080,00000000), ref: 004625C6
                                                                            • GetLastError.KERNEL32 ref: 004625EB
                                                                            • __dosmaperr.LIBCMT ref: 004625F2
                                                                            • GetFileType.KERNEL32(00000109), ref: 00462607
                                                                            • GetLastError.KERNEL32 ref: 0046262C
                                                                            • __dosmaperr.LIBCMT ref: 00462635
                                                                            • CloseHandle.KERNEL32(00000109), ref: 0046263E
                                                                            • __chsize_nolock.LIBCMT ref: 00462723
                                                                            • CloseHandle.KERNEL32(00000109), ref: 004628A2
                                                                            • CreateFileW.KERNEL32(00000080,?,00000001,0000000C,00000003,00000080,00000000), ref: 004628BF
                                                                            • GetLastError.KERNEL32 ref: 004628CE
                                                                            • __dosmaperr.LIBCMT ref: 004628D5
                                                                            • __lseeki64_nolock.LIBCMT ref: 00462908
                                                                            • __lseeki64_nolock.LIBCMT ref: 0046291D
                                                                            • __lseeki64_nolock.LIBCMT ref: 0046298C
                                                                            • __lseeki64_nolock.LIBCMT ref: 0046299D
                                                                            • __locking.LIBCMT ref: 00462A4C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File__lseeki64_nolock$CreateErrorLast__dosmaperr$CloseHandle__invoke_watson$Type__chsize_nolock__locking
                                                                            • String ID:
                                                                            • API String ID: 2633173609-0
                                                                            • Opcode ID: 73ccf638fcbd47b8637f0f19fd7112795cc4c81a6db7838cf43504a437daa166
                                                                            • Instruction ID: 19b5d40a3e20635bc283d5433884d9a13fa9064d3bd213727c871e867cc8e1e0
                                                                            • Opcode Fuzzy Hash: 73ccf638fcbd47b8637f0f19fd7112795cc4c81a6db7838cf43504a437daa166
                                                                            • Instruction Fuzzy Hash: C2223671900A09BBDF219F68CE45BBF7BA0AB00318F24456BE85197391E7BD8D44CB1B

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 780 403c2f-403cb7 call 40749d * 2 call 40e441 * 2 call 40e46d call 40e2de 793 403cc6-403cca 780->793 794 403cb9-403cc3 call 44f27b 780->794 796 403cda-403cdd 793->796 797 403ccc-403cd3 call 403886 793->797 794->793 799 403d18-403d43 call 40e30a call 403a71 call 44e722 796->799 800 403cdf-403ce2 796->800 797->796 815 403d70-403d9b call 40e30a call 403a71 call 44e722 799->815 816 403d45-403d49 799->816 800->799 803 403ce4-403d10 GetForegroundWindow call 40306a call 427c0d call 44e722 800->803 820 403d11-403d15 803->820 833 403db1-403ddc call 40e30a call 403a71 call 44e722 815->833 834 403d9d-403dab GetForegroundWindow call 40306a 815->834 818 403d4b 816->818 819 403d6c-403d6e 816->819 822 403d4d-403d5e call 427c0d 818->822 823 403d5f-403d6a call 44e722 819->823 822->823 823->820 844 403e09-403e34 call 40e30a call 403a71 call 44e722 833->844 845 403dde-403df4 call 40dccf IsWindow 833->845 839 403dad-403daf 834->839 839->822 857 403e36-403e51 call 405b0d call 405b60 844->857 858 403e5b-403e86 call 40e30a call 403a71 call 44e722 844->858 845->819 850 403dfa-403e07 call 40306a 845->850 850->839 857->858 867 403e53-403e56 857->867 870 403e88-403e9a call 40e441 858->870 871 403e9c-403ec7 call 40e30a call 403a71 call 44e722 858->871 867->823 870->871 880 403ec9-403ed9 call 44ef6a 871->880 881 403edc-403f07 call 40e30a call 403a71 call 44e722 871->881 880->881 890 403f10-403f3b call 40e30a call 403a71 call 44e722 881->890 891 403f09-403f0c 881->891 898 403f51-403f54 890->898 899 403f3d-403f4f call 40e441 890->899 891->890 901 403f61-403f6e 898->901 902 403f56-403f5a 898->902 899->898 904 403f70-403f76 CharUpperBuffW 901->904 905 403f78-403f7e 901->905 902->901 904->905 906 403f80-403f83 905->906 907 403f8d-403f96 905->907 906->907 908 403f85-403f8b CharUpperBuffW 906->908 909 403fa7 EnumWindows 907->909 910 403f98-403fa5 GetDesktopWindow 907->910 908->907 911 403fad-403fc3 call 40434b call 40749d 909->911 910->911 917 403fe3 911->917 918 403fc5-403fcc 911->918 919 403fd5-403fd8 918->919 920 403fce-403fd3 call 407480 918->920 922 403fda-403fde call 40306a 919->922 920->922 922->917
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(0046BF68,0048B334,0048C0C0,0048C170,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe,?,?,?,?,?,0040126A), ref: 00403CE4
                                                                              • Part of subcall function 00403A71: CharUpperBuffW.USER32(0046BF68,0048B334,0046BF68,?,?,00000000,0046BF68,0048B334,0048C0C0,0048C170,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 00403B54
                                                                            • GetForegroundWindow.USER32(?,00000104,ACTIVE,?,00000104,LAST,0046BF68,0048B334,0048C0C0,0048C170,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 00403D9D
                                                                            • IsWindow.USER32(0048B334), ref: 00403DEC
                                                                            • CharUpperBuffW.USER32(?,?,?,00000104,TITLE,?,00000104,ALL,?,00000104,INSTANCE,?,00000104,CLASS,?,00000104), ref: 00403F76
                                                                            • CharUpperBuffW.USER32(?,?,?,00000104,TITLE,?,00000104,ALL,?,00000104,INSTANCE,?,00000104,CLASS,?,00000104), ref: 00403F8B
                                                                            • GetDesktopWindow.USER32 ref: 00403F98
                                                                            • EnumWindows.USER32(00403FEB,?), ref: 00403FA7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$BuffCharUpper$Foreground$DesktopEnumWindows
                                                                            • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPTITLE$TITLE
                                                                            • API String ID: 2444216868-1002644998
                                                                            • Opcode ID: b770b4687b25d056ccb3addbc4b506e2bd315c5016a6c12a7c11e9a22061d8cb
                                                                            • Instruction ID: 35681d50ae41a6dd6df3f4c88348625863dd71f3e960296de463811a950ee33f
                                                                            • Opcode Fuzzy Hash: b770b4687b25d056ccb3addbc4b506e2bd315c5016a6c12a7c11e9a22061d8cb
                                                                            • Instruction Fuzzy Hash: 53C1A17190554AAECB01EF66C8419D9BFB8BF04309B04427BF914B3692C738FA55CBDA

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 925 41d6d5-41d6ed 926 41d706 925->926 927 41d6ef-41d704 call 405aa7 call 40fd19 925->927 928 41d70a-41d741 call 40e30a call 405aa7 call 40fc63 call 40e5c0 call 44e722 926->928 927->926 927->928 943 41d747-41d74e 928->943 944 41d9bd-41d9c3 928->944 945 41d754-41d784 call 405aa7 call 40fc41 call 44e973 call 452d5f 943->945 946 41d858-41d86a call 412a2c 943->946 970 41d786-41d7ca call 44e973 call 44e949 call 405aa7 call 40fc41 call 44e949 945->970 971 41d7cb-41d7fb call 405aa7 call 40fc41 call 44e973 GetFileAttributesW 945->971 952 41d87c-41d8bf call 405aa7 call 40fc41 call 4514e8 946->952 953 41d86c-41d87a call 41a14b 946->953 973 41d8c1-41d8df call 44e973 * 2 952->973 974 41d8e2-41d964 call 44e973 call 44e949 * 3 call 405aa7 call 40fc41 call 40c9da call 40c488 952->974 962 41d81b-41d823 call 4101fc 953->962 962->944 970->971 996 41d828-41d850 call 405aa7 call 40fc41 call 40c78e 971->996 997 41d7fd-41d7ff 971->997 973->974 1023 41d966-41d969 974->1023 1024 41d96b-41d96d 974->1024 996->944 1019 41d856 996->1019 997->996 1001 41d801-41d817 call 44f00e 997->1001 1001->996 1013 41d819 1001->1013 1013->962 1019->1013 1023->1024 1025 41d96f-41d98b call 405aa7 call 40fc41 call 412c71 1023->1025 1024->1025 1026 41d9a6 1024->1026 1037 41d990-41d992 1025->1037 1027 41d9a7-41d9aa call 4101fc 1026->1027 1032 41d9af-41d9b2 1027->1032 1032->944 1034 41d9b4-41d9bc call 4520b6 1032->1034 1034->944 1037->1032 1039 41d994-41d9a4 call 41a14b 1037->1039 1039->1027
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$_wcscat$AttributesFileMessage_fseek_wcschr
                                                                            • String ID: >>>AUTOIT SCRIPT<<<$\
                                                                            • API String ID: 1061597502-1896584978
                                                                            • Opcode ID: 6a767beeb6302ae742f4deb9d810584f862763ff2a9e622a16c04784fa7f4541
                                                                            • Instruction ID: 61eb2778df3db36280617f29fa069db34b17f38730bec27e1dea06aac2843fa4
                                                                            • Opcode Fuzzy Hash: 6a767beeb6302ae742f4deb9d810584f862763ff2a9e622a16c04784fa7f4541
                                                                            • Instruction Fuzzy Hash: 3C7168B2D1011966DF20F7B18D86AEF73ADAF44318F1405BBF505F7181EA3C9A888B59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1042 4060c8-406210 call 453ed0 call 44e9ed GetModuleFileNameW call 4514e8 call 451532 call 45156f call 44e9ed call 44e973 RegOpenKeyExW 1057 406216-40623a RegQueryValueExW 1042->1057 1058 40632f-406338 1042->1058 1059 406240-406265 1057->1059 1060 406326-406329 RegCloseKey 1057->1060 1061 406268-406279 1059->1061 1060->1058 1062 406298-4062a7 call 44f00e 1061->1062 1063 40627b-40627f 1061->1063 1069 4062d4-40631b call 44e9ed call 45158d 1062->1069 1070 4062a9-4062bf call 44f00e 1062->1070 1063->1062 1064 406281-406293 call 44e949 1063->1064 1072 40631d-406321 1064->1072 1069->1060 1069->1072 1070->1069 1077 4062c1-4062d3 call 44e949 1070->1077 1072->1061 1077->1069
                                                                            APIs
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00406166
                                                                            • _wcsncat.LIBCMT ref: 00406195
                                                                            • __makepath.LIBCMT ref: 004061B1
                                                                              • Part of subcall function 0045156F: __wmakepath_s.LIBCMT ref: 00451583
                                                                              • Part of subcall function 0044E9ED: std::exception::exception.LIBCMT ref: 0044EA3C
                                                                              • Part of subcall function 0044E9ED: __CxxThrowException@8.LIBCMT ref: 0044EA51
                                                                            • _wcscpy.LIBCMT ref: 004061EC
                                                                            • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00406208
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 00406232
                                                                            • _wcscat.LIBCMT ref: 0040628C
                                                                            • _wcscat.LIBCMT ref: 004062CD
                                                                            • _wcsncpy.LIBCMT ref: 00406306
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00406329
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$CloseException@8FileModuleNameOpenQueryThrowValue__makepath__wmakepath_s_malloc_wcscpy_wcsncat_wcsncpystd::exception::exception
                                                                            • String ID: <v@$Include$Software\AutoIt v3\AutoIt$\
                                                                            • API String ID: 3663597669-4126755141
                                                                            • Opcode ID: 5bf4ab24d776dbe09a2511fb973cb2f09b7e361b1c47bcd7bff25fbae2677942
                                                                            • Instruction ID: 7a0ec9e26652ebfc38452f8fd7d191dc43944444fa956801943b60db48f99f1d
                                                                            • Opcode Fuzzy Hash: 5bf4ab24d776dbe09a2511fb973cb2f09b7e361b1c47bcd7bff25fbae2677942
                                                                            • Instruction Fuzzy Hash: 846149B1D41208ABDB10EF99EC8599E77F8FB48304B5044BFE919E3291E7349A44CF58

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1081 41dbd4-41dc0a call 405aa7 call 40fc41 1086 41dc23 1081->1086 1087 41dc0c-41dc21 call 405aa7 call 40fd19 1081->1087 1088 41dc27-41dc29 1086->1088 1087->1086 1087->1088 1091 41dcd5-41dcd8 1088->1091 1093 41dc2e-41dc35 1091->1093 1094 41dcde-41dd89 call 405aa7 call 40fc41 call 45158d call 40c247 call 40c4db call 4514e8 call 44e949 * 2 GetCurrentDirectoryW SetCurrentDirectoryW 1091->1094 1096 41dc37-41dc3a 1093->1096 1097 41dc3c-41dc40 1093->1097 1143 41dd8b-41dd8c 1094->1143 1144 41dd9c-41ddae GetFileAttributesW 1094->1144 1099 41dc45-41dc46 1096->1099 1101 41dc42 1097->1101 1102 41dc47-41dc4e 1097->1102 1099->1102 1101->1099 1104 41dc50-41dc54 1102->1104 1105 41dcc4 1102->1105 1104->1105 1108 41dc56-41dc5a 1104->1108 1106 41dcc6-41dcc9 1105->1106 1109 41dcd0 1106->1109 1110 41dccb-41dcce 1106->1110 1112 41dcc0-41dcc2 1108->1112 1113 41dc5c-41dc60 1108->1113 1114 41dcd3-41dcd4 1109->1114 1110->1114 1117 41dcb9-41dcba 1112->1117 1113->1112 1116 41dc62-41dc66 1113->1116 1114->1091 1119 41dc68-41dc6c 1116->1119 1120 41dcbc-41dcbe 1116->1120 1117->1106 1119->1120 1121 41dc6e-41dc72 1119->1121 1120->1117 1123 41dc74-41dc78 1121->1123 1124 41dcb7 1121->1124 1123->1124 1126 41dc7a-41dc7e 1123->1126 1124->1117 1129 41dcb0-41dcb5 1126->1129 1130 41dc80-41dc84 1126->1130 1129->1106 1130->1129 1132 41dc86-41dc8a 1130->1132 1134 41dca9-41dcae 1132->1134 1135 41dc8c-41dc90 1132->1135 1134->1106 1135->1134 1137 41dc92-41dc96 1135->1137 1139 41dca2-41dca7 1137->1139 1140 41dc98-41dc9c 1137->1140 1139->1106 1140->1139 1142 41dd8e 1140->1142 1145 41dd8f-41dd97 call 4101fc 1142->1145 1143->1145 1147 41ddb0-41ddb2 1144->1147 1148 41de05-41de18 call 41de3c 1144->1148 1153 41de33-41de39 1145->1153 1147->1148 1151 41ddb4-41ddd7 GetFileAttributesW SetFileAttributesW 1147->1151 1152 41de1d-41de1f 1148->1152 1154 41dde4-41dde7 1151->1154 1155 41ddd9-41dde2 SetCurrentDirectoryW 1151->1155 1157 41de2a-41de31 SetCurrentDirectoryW 1152->1157 1158 41de21-41de25 call 4101fc 1152->1158 1156 41dde9-41de04 SetCurrentDirectoryW call 44e973 1154->1156 1154->1157 1155->1143 1156->1148 1157->1153 1158->1157
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • _wcsncpy.LIBCMT ref: 0041DCFC
                                                                            • _wcscat.LIBCMT ref: 0041DD4F
                                                                            • _wcscat.LIBCMT ref: 0041DD62
                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0041DD72
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041DD85
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0041DDA9
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0041DDBB
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 0041DDCF
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041DDE0
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041DDF0
                                                                            • _wcscpy.LIBCMT ref: 0041DDFE
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,00000000,00000003,00000000), ref: 0041DE31
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$AttributesFile$_wcscat$Message_wcscpy_wcsncpy
                                                                            • String ID: *.*
                                                                            • API String ID: 3717301856-438819550
                                                                            • Opcode ID: 603d72be2bec5c54eee4aa541953f462cd9650e9e6c6c029130f51442477e6a5
                                                                            • Instruction ID: 5825f315c92a54745c8b95b965c5411bd5e151bf0bcb3a171f06d9f56f1f0150
                                                                            • Opcode Fuzzy Hash: 603d72be2bec5c54eee4aa541953f462cd9650e9e6c6c029130f51442477e6a5
                                                                            • Instruction Fuzzy Hash: E361DBF5D0011896DF20AB65CC45BEE7368EF04314F54897BE945E3280E67C9AC6CB9D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2d29e8ed4e1106b380a19fad00dbb929a1bab4918ae0f6babdf43499c9426a3d
                                                                            • Instruction ID: 8bfe1705bfab2b7fecbb4446f26cada722f6ccf31b68c76c898d4e0b8ba4390d
                                                                            • Opcode Fuzzy Hash: 2d29e8ed4e1106b380a19fad00dbb929a1bab4918ae0f6babdf43499c9426a3d
                                                                            • Instruction Fuzzy Hash: D312D7705042869FCB229F68C8807BA7BF1AF0630AF14475BED6297393D3785869C75B

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1401 4130ce-4130d9 1402 4130dd-413115 call 4523ce call 412c26 call 451670 1401->1402 1409 413223 1402->1409 1410 41311b-4131e9 call 4523ce * 2 call 412c26 call 44e973 call 4523ce * 2 call 412c26 call 44e973 call 44ef27 1402->1410 1411 413227-41322b 1409->1411 1432 4131eb-413219 call 451d73 call 4523ce call 451d73 1410->1432 1433 41323a-41323c 1410->1433 1411->1402 1413 413231-413233 1411->1413 1415 413234-413237 1413->1415 1439 41321e-413221 1432->1439 1433->1415 1439->1411
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock$_fseek_wcscpy$__fseek_nolock
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe$FILE
                                                                            • API String ID: 1218644068-3293826460
                                                                            • Opcode ID: 6e6a3b2bfe82ee4463ba5e8e73eabdcc83c3f41dc4378e2c6ae9e3450a07caa2
                                                                            • Instruction ID: 16955c187f1d51c9af23cef21f966cda246683522ea37d69e2bde0f0683897d4
                                                                            • Opcode Fuzzy Hash: 6e6a3b2bfe82ee4463ba5e8e73eabdcc83c3f41dc4378e2c6ae9e3450a07caa2
                                                                            • Instruction Fuzzy Hash: 9A4186B2D40208BAEF21EBE1DC45FDE777DAF44304F1004ABBA44B2091E6B997988775

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1472 4535f2-45360a 1473 45360c-453625 call 45507c call 45501d 1472->1473 1474 45362a-453640 call 451260 1472->1474 1486 453874-453877 1473->1486 1479 453642-453649 1474->1479 1480 45366c-453680 call 45507c call 45501d 1474->1480 1482 45365d-453660 1479->1482 1483 45364b 1479->1483 1499 453683-453685 1480->1499 1489 453662 1482->1489 1490 45368a call 45df97 1482->1490 1487 453651-45365b call 45507c 1483->1487 1488 45364d-45364f 1483->1488 1487->1499 1488->1482 1488->1487 1489->1480 1494 453664-45366a 1489->1494 1497 45368f-45369b call 45e263 1490->1497 1494->1480 1494->1490 1503 45369d-4536a7 call 454f21 1497->1503 1504 4536aa-4536b6 call 45e297 1497->1504 1501 453873 1499->1501 1501->1486 1503->1504 1509 4536c5-4536d1 call 45e2cb 1504->1509 1510 4536b8-4536c2 call 454f21 1504->1510 1515 4536e0-4536ea 1509->1515 1516 4536d3-4536dd call 454f21 1509->1516 1510->1509 1518 4536ec 1515->1518 1519 45375a-453765 call 45e027 1515->1519 1516->1515 1522 4536f6-453712 call 45e027 1518->1522 1523 4536ee-4536f4 1518->1523 1519->1501 1526 45376b-45376e 1519->1526 1522->1501 1530 453718-45371b 1522->1530 1523->1519 1523->1522 1528 453770-453779 call 45dfe6 1526->1528 1529 4537a3-4537b5 1526->1529 1528->1529 1538 45377b-4537a1 1528->1538 1532 4537b7-4537c5 call 45e3d0 1529->1532 1533 453871 1530->1533 1534 453721-45372a call 45dfe6 1530->1534 1541 4537c7-4537d1 1532->1541 1542 4537d3-4537fd call 45e320 call 45e3d0 1532->1542 1533->1501 1534->1533 1543 453730-453748 call 45e027 1534->1543 1538->1532 1541->1542 1551 45380c-453836 call 45e320 call 45e3d0 1542->1551 1552 4537ff-453809 1542->1552 1543->1501 1548 45374e-453755 1543->1548 1548->1533 1557 453845-453855 call 45e320 1551->1557 1558 453838-453842 1551->1558 1552->1551 1561 453857 1557->1561 1562 453882-45389a 1557->1562 1558->1557 1563 45385d-45386b 1561->1563 1564 453859-45385b 1561->1564 1565 45389c-4538b5 1562->1565 1566 45386e 1562->1566 1563->1566 1564->1563 1567 453878-45387a 1564->1567 1565->1533 1566->1533 1567->1533 1568 45387c 1567->1568 1568->1562 1569 45387e-453880 1568->1569 1569->1533 1569->1562
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset
                                                                            • String ID:
                                                                            • API String ID: 2102423945-0
                                                                            • Opcode ID: 8709f0b67ccc48c4e29bd1c705b9165b5ffce8b257a50cfd2839d6adaa9aa818
                                                                            • Instruction ID: 93cfa079bb3fa6d06c64970c7f5ad7d0c4230e4e74fcc52d062f6826687924d9
                                                                            • Opcode Fuzzy Hash: 8709f0b67ccc48c4e29bd1c705b9165b5ffce8b257a50cfd2839d6adaa9aa818
                                                                            • Instruction Fuzzy Hash: DA81F971A00600ABDB28AF6ACC8196FB7E5EF54756B14452FFC11D2383E778DB088B59

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1631 412f5e-412f9f call 411ac9 call 451d73 call 4130ce 1638 412fa1 1631->1638 1639 412fa9-413056 call 4523ce * 4 call 451d73 call 450ae9 * 2 call 4523ce call 412c26 call 411a75 1631->1639 1640 412fa3-412fa4 1638->1640 1662 413058-41306a call 450d38 * 2 1639->1662 1663 41306f-413073 1639->1663 1642 4130c7-4130cb 1640->1642 1662->1640 1665 4130b1-4130b9 call 450d38 1663->1665 1666 413075-4130aa call 411ac9 call 411af7 call 450d38 1663->1666 1673 4130bc-4130c5 1665->1673 1678 4130af 1666->1678 1673->1642 1678->1673
                                                                            APIs
                                                                            • _fseek.LIBCMT ref: 00412F84
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 004130E7
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 00413125
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 00413142
                                                                              • Part of subcall function 004130CE: _wcscpy.LIBCMT ref: 00413175
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 00413184
                                                                              • Part of subcall function 004130CE: __fread_nolock.LIBCMT ref: 004131A1
                                                                              • Part of subcall function 004130CE: _wcscpy.LIBCMT ref: 004131D0
                                                                              • Part of subcall function 004130CE: _fseek.LIBCMT ref: 004131F2
                                                                            • __fread_nolock.LIBCMT ref: 00412FB1
                                                                            • __fread_nolock.LIBCMT ref: 00412FBF
                                                                            • __fread_nolock.LIBCMT ref: 00412FD8
                                                                            • __fread_nolock.LIBCMT ref: 00412FF1
                                                                            • _fseek.LIBCMT ref: 00413008
                                                                            • _malloc.LIBCMT ref: 00413015
                                                                            • _malloc.LIBCMT ref: 0041301F
                                                                            • __fread_nolock.LIBCMT ref: 0041302E
                                                                              • Part of subcall function 00450D38: __lock.LIBCMT ref: 00450D56
                                                                              • Part of subcall function 00450D38: ___sbh_find_block.LIBCMT ref: 00450D61
                                                                              • Part of subcall function 00450D38: ___sbh_free_block.LIBCMT ref: 00450D70
                                                                              • Part of subcall function 00450D38: RtlFreeHeap.NTDLL(00000000,?,00472580,0000000C,00455513,00000000,00472858,0000000C,0045554B,?,?,?,00461185,00000004,00472B40,0000000C), ref: 00450DA0
                                                                              • Part of subcall function 00450D38: GetLastError.KERNEL32(?,00461185,00000004,00472B40,0000000C,00456F8A,?,?,00000000,00000000,00000000,00454BA3,00000001,00000214,?,00000000), ref: 00450DB1
                                                                            Strings
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 00412F67
                                                                            • >>>AUTOIT SCRIPT<<<, xrefs: 00412F93
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock$_fseek$_malloc_wcscpy$ErrorFreeHeapLast___sbh_find_block___sbh_free_block__lock
                                                                            • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 265842893-2111243058
                                                                            • Opcode ID: 381cc85e538e54c3940dcb950b10ceb135395bd434d351cf3b31d4928a848fb4
                                                                            • Instruction ID: f4d1da0c8a6fbb18ceafc9879cae3c5c5b185f25af741d58c88928373c1b6d83
                                                                            • Opcode Fuzzy Hash: 381cc85e538e54c3940dcb950b10ceb135395bd434d351cf3b31d4928a848fb4
                                                                            • Instruction Fuzzy Hash: 80419175900208BEDB20AF61CC42FDE7BB8EF45704F10445BFA44A7152DBB99A98CB59
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CharLowerBuffW.USER32(?,?,0046BF68), ref: 0041C4E8
                                                                            • GetDriveTypeW.KERNEL32(?,0046FB24,00000061,unknown,ramdisk,network,fixed,removable,cdrom,all), ref: 0041C63F
                                                                            • _wcscpy.LIBCMT ref: 0041C664
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharDriveLowerMessageType_wcscpy
                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                            • API String ID: 2654775160-1000479233
                                                                            • Opcode ID: a4bced8b5c57268d5562a5ef9a567ae6da3d03c0d2a86c41fb238adf3d09212d
                                                                            • Instruction ID: 9c1c073b62aa0e8ef385af659908c37397dc5094794e4e079a72e2e76f57fb54
                                                                            • Opcode Fuzzy Hash: a4bced8b5c57268d5562a5ef9a567ae6da3d03c0d2a86c41fb238adf3d09212d
                                                                            • Instruction Fuzzy Hash: AC51A731E81215ABCF10A7A2DC926EEB771EF41714F20882BF911771D2EB7C6E56864C
                                                                            APIs
                                                                              • Part of subcall function 00427955: LoadLibraryA.KERNEL32(Wininet.dll,004222DD), ref: 00427960
                                                                              • Part of subcall function 00427955: GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 00427972
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00422D8B
                                                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000,?,00000003), ref: 00422DF2
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll), ref: 00422E0D
                                                                            • GetProcAddress.KERNEL32(00000000,InternetQueryOptionW), ref: 00422E20
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00422F0E
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00422F19
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00422F24
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$AddressLoadProc$InternetOpen
                                                                            • String ID: <local>$InternetQueryOptionW$Wininet.dll
                                                                            • API String ID: 198108459-2230220794
                                                                            • Opcode ID: f58762aabc6be5a61c682d0b842e8373f80b47ca1580f1615fceb4ac60360d00
                                                                            • Instruction ID: df756f53dcf6a58436e68c9fb11ef3eb94b0e1e7365751bbd243ec574ff85a16
                                                                            • Opcode Fuzzy Hash: f58762aabc6be5a61c682d0b842e8373f80b47ca1580f1615fceb4ac60360d00
                                                                            • Instruction Fuzzy Hash: BF518D31B10225BFEF259B64ED49BEEB7B8FF04314F504126E410A6290CBB8AD45DA69
                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 004012C5
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004012D5
                                                                            • LoadIconW.USER32(000000A1), ref: 004012EF
                                                                            • LoadIconW.USER32(000000A4), ref: 00401301
                                                                            • RegisterClassExW.USER32(?), ref: 00401371
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$BrushClassColorCursorRegister
                                                                            • String ID: #$0$AutoIt v3$C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 1664269819-1688876140
                                                                            • Opcode ID: 79ae604c2ece932835a0c4772eb2b5c11f83d1a8ec0ef193ecd32122831a9563
                                                                            • Instruction ID: a4ae1f2f7a30b14d8864461e08ebee6a3adfffe902ce092d78f3296afce67af2
                                                                            • Opcode Fuzzy Hash: 79ae604c2ece932835a0c4772eb2b5c11f83d1a8ec0ef193ecd32122831a9563
                                                                            • Instruction Fuzzy Hash: 9F2136B1D04308AFDB009FA9EC88A9DBFB4FB88394F54053EE515A36A0D7B40944CF99
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00433F9A: CharUpperBuffW.USER32(?,?,?,?,00000000), ref: 00433FAD
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00434373
                                                                            • RegOpenKeyExW.KERNEL32(?,?,00000000,?,?,HKCR\), ref: 004343A2
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004343B6
                                                                            • RegQueryValueExW.KERNEL32(?,00000000,00000000,?,00000000,00000000), ref: 004343E7
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000), ref: 0043446B
                                                                            • RegCloseKey.ADVAPI32(?,00000000), ref: 0043460E
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0043461A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Close$QueryValue$BuffCharConnectMessageOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 4045058077-0
                                                                            • Opcode ID: 0578d846f5ff0b8a0a159295377fba254f4d7ce4d379a8d6993672bde0a99d9c
                                                                            • Instruction ID: f6a981f66e00b1d264ff148d2bdbeb4e7af21c5c7377ee539f2df3d1dd7ffcb6
                                                                            • Opcode Fuzzy Hash: 0578d846f5ff0b8a0a159295377fba254f4d7ce4d379a8d6993672bde0a99d9c
                                                                            • Instruction Fuzzy Hash: C7A19D72508205AFC710EF65C8819AFB3ECEF88318F00492EF995D7191DB38ED458B6A
                                                                            APIs
                                                                            • SetFocus.USER32 ref: 00401751
                                                                              • Part of subcall function 00422413: FreeLibrary.KERNEL32(00000000), ref: 0042245F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FocusFreeLibrary
                                                                            • String ID: TaskbarCreated
                                                                            • API String ID: 851375671-2362178303
                                                                            • Opcode ID: 67fe46154a8852e93ed32e521688f5f91017ce0591af7f624175e23647ffdf25
                                                                            • Instruction ID: 766dd6d360e5467922692d02d84ae20bf874affe0ca56d6e1b295126ee2023ca
                                                                            • Opcode Fuzzy Hash: 67fe46154a8852e93ed32e521688f5f91017ce0591af7f624175e23647ffdf25
                                                                            • Instruction Fuzzy Hash: 4B51C032654185EBEB11BF68EC8996A3BA1A701304F04843BF406B72F1D7B98C55976E
                                                                            APIs
                                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004018F4
                                                                              • Part of subcall function 00401A43: LoadLibraryA.KERNEL32(uxtheme.dll,00401967,?), ref: 00401A4E
                                                                              • Part of subcall function 00401A43: GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 00401A60
                                                                            • SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 004019D8
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 004019E8
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00401A0E
                                                                            • FreeLibrary.KERNEL32(?), ref: 00401A20
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem$Library$AddressFreeLoadMessageProc
                                                                            • String ID: AutoIt$Error allocating memory.
                                                                            • API String ID: 3708148760-4017498283
                                                                            • Opcode ID: ea2fbedb0a2f2e78be5d3471e1697a934fcb5d0375a402043767215513df5e19
                                                                            • Instruction ID: a1573135fad00692fa7f18f263709ebf7850b98c3ea4e622f761f513c07eac78
                                                                            • Opcode Fuzzy Hash: ea2fbedb0a2f2e78be5d3471e1697a934fcb5d0375a402043767215513df5e19
                                                                            • Instruction Fuzzy Hash: E9318072508350ABD7119F56DC85A9ABBE8BB95304F00093FF998A32A1C7B49984CF5A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock_fseek$_strcat
                                                                            • String ID: AU3!$EA06
                                                                            • API String ID: 4101178306-2658333250
                                                                            • Opcode ID: e012c83945f9d281c39d7056c8335287a7a112ae67a96d600054abbfed0335ba
                                                                            • Instruction ID: 5757126cfbf0ebb3bd41f3560bc587e5df1a16494f2c8b6fb9d4fd78a3a92d38
                                                                            • Opcode Fuzzy Hash: e012c83945f9d281c39d7056c8335287a7a112ae67a96d600054abbfed0335ba
                                                                            • Instruction Fuzzy Hash: FE217D31A002087ADB119F688D46FDE3BA9AF45305F2404AFF941E3193E6B8E2988765
                                                                            APIs
                                                                            Strings
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 0040C518
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$DesktopFolderFromListMallocPath
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 192938534-2994071119
                                                                            • Opcode ID: b04782f8b56c921b0f9fe3e0b5d24f71d1b40231c6593093b340969f23c4b676
                                                                            • Instruction ID: a5985507b53a5442811d6ddeb295535670b2ff61c6a54e4119d2549b79321a26
                                                                            • Opcode Fuzzy Hash: b04782f8b56c921b0f9fe3e0b5d24f71d1b40231c6593093b340969f23c4b676
                                                                            • Instruction Fuzzy Hash: F4215176900118FBDB11DF90DC88EEE7BB8EF44704F1041AAF905AB290DB35EA45DB58
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000104), ref: 004013BB
                                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 004013DC
                                                                            • ShowWindow.USER32(00000000), ref: 004013F0
                                                                            • ShowWindow.USER32(00000000), ref: 004013F9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateShow
                                                                            • String ID: AutoIt v3$C:\Users\user\Desktop\regsvr.exe$edit
                                                                            • API String ID: 1584632944-2164139470
                                                                            • Opcode ID: b82919e5d7ef4d5fe5c3997ddc82d13d67b8087a6736bae879a08434eb98ac3a
                                                                            • Instruction ID: 8243fe0b56721b3ac0f0932c458c7c048deda5dae2dc7eb2f2db3a016a53c8e1
                                                                            • Opcode Fuzzy Hash: b82919e5d7ef4d5fe5c3997ddc82d13d67b8087a6736bae879a08434eb98ac3a
                                                                            • Instruction Fuzzy Hash: 76F0DA722422317AD6312B17AC4CFE72E6EEF867B0F120031FA1CA6260D2655C91C9F9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$LoadString$__swprintf_wcscpy
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe$ONAUTOITSTART
                                                                            • API String ID: 1746614660-2616765744
                                                                            • Opcode ID: 3995a2e13c5f4f376e2bdd8cbf6967d5df4c2717eaa53daed1c23ac33e28242e
                                                                            • Instruction ID: 53a84e5e32ac5007bae37493b6228830e89fc281fe87a5850283bc7e57e54f10
                                                                            • Opcode Fuzzy Hash: 3995a2e13c5f4f376e2bdd8cbf6967d5df4c2717eaa53daed1c23ac33e28242e
                                                                            • Instruction Fuzzy Hash: C3412B71608305ABC711EB748C84AEBBB9CAB15304F14062FF559C3251DF7898C69B9E
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset
                                                                            • String ID: AutoIt script files (*.au3, *.a3x)$C:\Users\user\Desktop\regsvr.exe$L$Run Script:$au3
                                                                            • API String ID: 2102423945-1925255675
                                                                            • Opcode ID: 8e1bfe0483ebeed70b9e4ea0b95cc7e4357020f8f96617a667ecadb6194bfa51
                                                                            • Instruction ID: d02f1d07d1508ac43af70b6cdc879bdb56ceb7d31fb44b40a89a76a1db2e01c8
                                                                            • Opcode Fuzzy Hash: 8e1bfe0483ebeed70b9e4ea0b95cc7e4357020f8f96617a667ecadb6194bfa51
                                                                            • Instruction Fuzzy Hash: C41160B1800518ABDB11EFD5DC45BEF7BBCAF05304F00405AE544A6282E7BC56498BAA
                                                                            APIs
                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000008,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe,004011AB,C:\Users\user\Desktop\regsvr.exe), ref: 0040D9AE
                                                                            • LockServiceDatabase.ADVAPI32(00000000), ref: 0040D9BB
                                                                            • UnlockServiceDatabase.ADVAPI32(00000000), ref: 0040D9C6
                                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0040D9DE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Service$Database$CloseHandleLockManagerOpenUnlock
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 3647510317-2994071119
                                                                            • Opcode ID: c826f0a8cc633e358eb96a105c6fc6aaafa6778c0bc2a7c870c343861650bff5
                                                                            • Instruction ID: 622ebe098e7d035d8a5bcfc97c789e973ec340aecb5eb206808113be1e38ea2d
                                                                            • Opcode Fuzzy Hash: c826f0a8cc633e358eb96a105c6fc6aaafa6778c0bc2a7c870c343861650bff5
                                                                            • Instruction Fuzzy Hash: D8E06DF3C59160ABC7202BF06CD89DB3A59A70521A7051473F252A2290D7794C499BBE
                                                                            APIs
                                                                              • Part of subcall function 00427955: LoadLibraryA.KERNEL32(Wininet.dll,004222DD), ref: 00427960
                                                                              • Part of subcall function 00427955: GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 00427972
                                                                            • FreeLibrary.KERNEL32(00000000,0000008C,000000FF), ref: 004222F8
                                                                            • __wcsicmp.LIBCMT ref: 00422325
                                                                            • FreeLibrary.KERNEL32(?,00000001), ref: 00422404
                                                                              • Part of subcall function 004187CB: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 0041881F
                                                                              • Part of subcall function 004187CB: LoadStringW.USER32(?,?,00000FFF), ref: 00418832
                                                                              • Part of subcall function 004187CB: __swprintf.LIBCMT ref: 0041886D
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188A0
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188AD
                                                                              • Part of subcall function 004187CB: _wcscpy.LIBCMT ref: 004188C3
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188E0
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188F3
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 00418900
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 00418914
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 00418927
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$LibraryLoad$FreeString$AddressProc__swprintf__wcsicmp_wcscpy
                                                                            • String ID: abort
                                                                            • API String ID: 2874445117-4206212132
                                                                            • Opcode ID: 2f7553a218f7c69e5c98e33009b5c0614029380b6e0a63d6fb0b289303dba03b
                                                                            • Instruction ID: a3386cf9f928701ac749cf6970a2d1e8a5d20b7f8432ad1f140508c4762c62a0
                                                                            • Opcode Fuzzy Hash: 2f7553a218f7c69e5c98e33009b5c0614029380b6e0a63d6fb0b289303dba03b
                                                                            • Instruction Fuzzy Hash: 9E310870B04225BBDB15AF75A9416EEB764FF04308F40053FF815D7281DBFC5A80969A
                                                                            APIs
                                                                              • Part of subcall function 0040DF43: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,C:\Users\user\Desktop\regsvr.exe,?,00412A47,0046BF68,?), ref: 0040DF75
                                                                            • _strcat.LIBCMT ref: 00412A53
                                                                              • Part of subcall function 00412047: _memset.LIBCMT ref: 0041204F
                                                                            • _strlen.LIBCMT ref: 00412A72
                                                                              • Part of subcall function 0041210B: _memset.LIBCMT ref: 00412164
                                                                              • Part of subcall function 0041210B: _memset.LIBCMT ref: 0041216F
                                                                              • Part of subcall function 0041210B: _memset.LIBCMT ref: 0041217B
                                                                              • Part of subcall function 0041210B: _sprintf.LIBCMT ref: 00412196
                                                                              • Part of subcall function 00412B2B: _strcat.LIBCMT ref: 00412B5F
                                                                              • Part of subcall function 00412B2B: __fread_nolock.LIBCMT ref: 00412B88
                                                                              • Part of subcall function 00412B2B: _fseek.LIBCMT ref: 00412BD7
                                                                              • Part of subcall function 00412B2B: _fseek.LIBCMT ref: 00412BEA
                                                                              • Part of subcall function 00412B2B: __fread_nolock.LIBCMT ref: 00412BFC
                                                                            • __fread_nolock.LIBCMT ref: 00412AE7
                                                                            • _ftell.LIBCMT ref: 00412B18
                                                                            Strings
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 00412A38
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$__fread_nolock$_fseek_strcat$ByteCharMultiWide_ftell_sprintf_strlen
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 191142894-2994071119
                                                                            • Opcode ID: f3fd2d15e2c2829b1cb4dbe26ff2ab6dba542c3759986cf9e15b2d68dd32ea80
                                                                            • Instruction ID: 6cc8a242c6d0d15e650d7c968ce1b1718db6e337d876b9f68718d1ff6f1594d0
                                                                            • Opcode Fuzzy Hash: f3fd2d15e2c2829b1cb4dbe26ff2ab6dba542c3759986cf9e15b2d68dd32ea80
                                                                            • Instruction Fuzzy Hash: D9217E726083412BC714FF769D42A9EB7C8EF05314F10493FF555D2182EA7CE5A4828E
                                                                            APIs
                                                                              • Part of subcall function 00427A87: LoadLibraryA.KERNEL32(Wininet.dll,00422C85,00000000,?), ref: 00427A92
                                                                              • Part of subcall function 00427A87: GetProcAddress.KERNEL32(00000000,InternetCrackUrlW), ref: 00427AA4
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C91
                                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000003C,00000000,?), ref: 00422D07
                                                                            • _wcscat.LIBCMT ref: 00422D19
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422D56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$AddressCrackInternetLoadProc_wcscat
                                                                            • String ID: <
                                                                            • API String ID: 3724098518-4251816714
                                                                            • Opcode ID: 8367d08c40cc6b6ce7e3cf0967e2fbe33a5d0c0fd4857d35a30b8cf9c81dd12f
                                                                            • Instruction ID: 7daa6fc9d9cce2f9e8e1424134e8f0e93db928ee65bac882d1dfd5c299807c39
                                                                            • Opcode Fuzzy Hash: 8367d08c40cc6b6ce7e3cf0967e2fbe33a5d0c0fd4857d35a30b8cf9c81dd12f
                                                                            • Instruction Fuzzy Hash: 663104B1D00229AFDF10DF95E9406EEBBB4EB08344F50806BE814A7210D7789A45CF68
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$__filbuf_memcpy_s
                                                                            • String ID:
                                                                            • API String ID: 2885843685-0
                                                                            • Opcode ID: 50d71b4f65ed1a6bd65b6caf26a703ed5e466bc03891ec77ca7ec0195b734041
                                                                            • Instruction ID: 8d222a48d55b4acc09949d8f2fd565fbcdcb2311850145653533022fb81319fc
                                                                            • Opcode Fuzzy Hash: 50d71b4f65ed1a6bd65b6caf26a703ed5e466bc03891ec77ca7ec0195b734041
                                                                            • Instruction Fuzzy Hash: 32513B35900605EBCB208F698E4499F77B4FF42322F14825BFC25922D3D7B89E49CB59
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00433F9A: CharUpperBuffW.USER32(?,?,?,?,00000000), ref: 00433FAD
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00434D9B
                                                                            • RegOpenKeyExW.KERNEL32(?,?,00000000,?,?), ref: 00434DE3
                                                                            • RegEnumKeyExW.KERNEL32(?,-00000001,?,000000FF,00000000,00000000,00000000,?), ref: 00434E48
                                                                            • RegCloseKey.ADVAPI32(?,?), ref: 00434E92
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00434E9C
                                                                              • Part of subcall function 00418B7F: GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000003), ref: 00418BA3
                                                                              • Part of subcall function 00418B7F: FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000003), ref: 00418BB5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseMessage$BuffCharConnectEnumErrorFormatLastOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 3426653046-0
                                                                            • Opcode ID: 82002da3ab14b81dc7bf33c03ebbb28d1e7facc996a00cd2861bcb28b8cddcd5
                                                                            • Instruction ID: d0c25eb97ffe9a7d3d65260d8673287951bf97caa5b00c2679f155d554cd518b
                                                                            • Opcode Fuzzy Hash: 82002da3ab14b81dc7bf33c03ebbb28d1e7facc996a00cd2861bcb28b8cddcd5
                                                                            • Instruction Fuzzy Hash: 86514D72D00109ABDF00EFE1DC86DEEB779EF48358F10443BF611A7191DA78AA458B69
                                                                            APIs
                                                                            • __calloc_crt.LIBCMT ref: 004532CC
                                                                            • CreateThread.KERNEL32(00000000,?,00453219,00000000,00000004,00000000), ref: 004532FF
                                                                            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 0045330F
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 0045331A
                                                                            • __dosmaperr.LIBCMT ref: 00453332
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$CreateErrorLastResume__calloc_crt__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 1799056965-0
                                                                            • Opcode ID: da98295cac26577001e74339457104a521106f0aa7158b881982cf166fffbf0f
                                                                            • Instruction ID: 2c97fa6bf50048142bd6dde53a4aa4d36f385e81701ee299ce1724804f243ba6
                                                                            • Opcode Fuzzy Hash: da98295cac26577001e74339457104a521106f0aa7158b881982cf166fffbf0f
                                                                            • Instruction Fuzzy Hash: 15112671501700AEC7107F6A9C4589EB7A4EF4037BB20422FFC11962C3DE789E08856D
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?,?,75923340,?,0040CD52,?), ref: 0040CC13
                                                                            • GetLastError.KERNEL32(?,75923340,?,0040CD52,?), ref: 0040CC1E
                                                                            • CreateDirectoryW.KERNEL32(?,00000000,?,75923340,?,0040CD52,?), ref: 0040CC32
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • _wcsrchr.LIBCMT ref: 0040CC4C
                                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,?), ref: 0040CC7D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectory$AttributesErrorFileLast_wcscpy_wcsrchr
                                                                            • String ID:
                                                                            • API String ID: 2727006461-0
                                                                            • Opcode ID: 956842110015219fc8d30e4d020964cdda5cc4709e9927e9bbdbb273eadc84c9
                                                                            • Instruction ID: 0cbb9c6a20cb65e42aa01b96198927eed14ceaf003c0dad5c6cf13ba2f479420
                                                                            • Opcode Fuzzy Hash: 956842110015219fc8d30e4d020964cdda5cc4709e9927e9bbdbb273eadc84c9
                                                                            • Instruction Fuzzy Hash: C801CC31549215D9F6212771ACC1BBF23589F53368F14023BFD05B62C1DB7C9C46516D
                                                                            APIs
                                                                            • __lock.LIBCMT ref: 00450D56
                                                                              • Part of subcall function 00455532: __mtinitlocknum.LIBCMT ref: 00455546
                                                                              • Part of subcall function 00455532: __amsg_exit.LIBCMT ref: 00455552
                                                                              • Part of subcall function 00455532: RtlEnterCriticalSection.NTDLL(?), ref: 0045555A
                                                                            • ___sbh_find_block.LIBCMT ref: 00450D61
                                                                            • ___sbh_free_block.LIBCMT ref: 00450D70
                                                                            • RtlFreeHeap.NTDLL(00000000,?,00472580,0000000C,00455513,00000000,00472858,0000000C,0045554B,?,?,?,00461185,00000004,00472B40,0000000C), ref: 00450DA0
                                                                            • GetLastError.KERNEL32(?,00461185,00000004,00472B40,0000000C,00456F8A,?,?,00000000,00000000,00000000,00454BA3,00000001,00000214,?,00000000), ref: 00450DB1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                            • String ID:
                                                                            • API String ID: 2714421763-0
                                                                            • Opcode ID: 1dae5a39ad9f5eaa0adcba3583bf8c6e65f4d52c9cb0ef0d6640d8a7f08b5655
                                                                            • Instruction ID: 66e46a8d836229765d90989f3e65ac2195dca750d16f6e27a5dd01344d14ddce
                                                                            • Opcode Fuzzy Hash: 1dae5a39ad9f5eaa0adcba3583bf8c6e65f4d52c9cb0ef0d6640d8a7f08b5655
                                                                            • Instruction Fuzzy Hash: D8018435945B05EADB207BF19C0576E3B74AF00726F10041FFC04562D3DA7C998C8A5D
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(00000000,00000000,?,00462A6C,?), ref: 0045A738
                                                                            • GetLastError.KERNEL32 ref: 0045A742
                                                                            • __dosmaperr.LIBCMT ref: 0045A771
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                                            • String ID: l*F
                                                                            • API String ID: 2583163307-1314440155
                                                                            • Opcode ID: eefab8a056bf7af00086c744b673e9c7d069fb4adba8596174a5886756ddd586
                                                                            • Instruction ID: f09ee62a79e51a0dbfe9eccd481b4493b46564523e94472456f7a56f09ae77e6
                                                                            • Opcode Fuzzy Hash: eefab8a056bf7af00086c744b673e9c7d069fb4adba8596174a5886756ddd586
                                                                            • Instruction Fuzzy Hash: F301F93251571055D6252679AC49B9B1BA48F8933FF25025FFC10C72D3EF5CC889819F
                                                                            APIs
                                                                              • Part of subcall function 00454A33: TlsGetValue.KERNEL32(?,0045321E), ref: 00454A3A
                                                                              • Part of subcall function 00454A33: TlsSetValue.KERNEL32(00000000,0045321E), ref: 00454A5B
                                                                              • Part of subcall function 00454A18: TlsGetValue.KERNEL32(?,00453229,00000000), ref: 00454A22
                                                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00453240
                                                                            • RtlExitUserThread.NTDLL(00000000), ref: 00453247
                                                                            • __freefls@4.LIBCMT ref: 00453264
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$ErrorExitLastThreadUser__freefls@4
                                                                            • String ID: PYE
                                                                            • API String ID: 968313176-4264731808
                                                                            • Opcode ID: 6aa40b1287019582424d44191b4f5ce09a5683a33315cff3292b6146c6323a0d
                                                                            • Instruction ID: 5d4058ec041952d9b9954e48f029bc613ef3864679ee79ba0df0b9b71de34fb5
                                                                            • Opcode Fuzzy Hash: 6aa40b1287019582424d44191b4f5ce09a5683a33315cff3292b6146c6323a0d
                                                                            • Instruction Fuzzy Hash: EF016D70604640ABDB04BFA6D90991E77A5AF8430FF20846EFC049A223EA7CCC49DA5D
                                                                            APIs
                                                                              • Part of subcall function 00454A33: TlsGetValue.KERNEL32(?,0045321E), ref: 00454A3A
                                                                              • Part of subcall function 00454A33: TlsSetValue.KERNEL32(00000000,0045321E), ref: 00454A5B
                                                                              • Part of subcall function 00454A18: TlsGetValue.KERNEL32(?,00453229,00000000), ref: 00454A22
                                                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00453240
                                                                            • RtlExitUserThread.NTDLL(00000000), ref: 00453247
                                                                            • __freefls@4.LIBCMT ref: 00453264
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$ErrorExitLastThreadUser__freefls@4
                                                                            • String ID: PYE
                                                                            • API String ID: 968313176-4264731808
                                                                            • Opcode ID: bd6881f481de14c1b4c4aa2bd908232be170b8059dcc2b685d8852f75bb59494
                                                                            • Instruction ID: f5f146f6554694dcdbbf0ed92666f6fdd4ea751d27dd79f0b83c45461b657d3f
                                                                            • Opcode Fuzzy Hash: bd6881f481de14c1b4c4aa2bd908232be170b8059dcc2b685d8852f75bb59494
                                                                            • Instruction Fuzzy Hash: BBF04F70604640ABDB44AF76990991E7799AF8430FF10846EFC048A223EA7CCC49DA2D
                                                                            APIs
                                                                              • Part of subcall function 00454BF1: __amsg_exit.LIBCMT ref: 00454BFF
                                                                            • CloseHandle.KERNEL32(?), ref: 004531C2
                                                                            • __freeptd.LIBCMT ref: 004531C9
                                                                            • RtlExitUserThread.NTDLL(00000000), ref: 004531D1
                                                                              • Part of subcall function 00455650: __FindPESection.LIBCMT ref: 004556A9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseExitFindHandleSectionThreadUser__amsg_exit__freeptd
                                                                            • String ID: PYE
                                                                            • API String ID: 2341454418-4264731808
                                                                            • Opcode ID: 1668dc219109d611c5936bca42f4df7c5966ce609d5865978ab2e3b8bc06c2f6
                                                                            • Instruction ID: 9bb45036a2f768db81f9a72b8cf415731e5970cb7e298e0cd498d74fdb4babc0
                                                                            • Opcode Fuzzy Hash: 1668dc219109d611c5936bca42f4df7c5966ce609d5865978ab2e3b8bc06c2f6
                                                                            • Instruction Fuzzy Hash: 5FF09031404900ABE2243FB09D19B6E3B64AF007ABF10055AF804851E3EBAC8E49865E
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,004222DD), ref: 00427960
                                                                            • GetProcAddress.KERNEL32(00000000,InternetOpenW), ref: 00427972
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: InternetOpenW$Wininet.dll
                                                                            • API String ID: 2574300362-877548236
                                                                            • Opcode ID: b1d8983364baa29d7161cbbf0cb1a01b6ef915cbfd28d9472f4ac8b7d1f71050
                                                                            • Instruction ID: 99dffb40ae353492489230e77bced5571cb5c4eb8d9f9eaf31004b6430a0dcd8
                                                                            • Opcode Fuzzy Hash: b1d8983364baa29d7161cbbf0cb1a01b6ef915cbfd28d9472f4ac8b7d1f71050
                                                                            • Instruction Fuzzy Hash: EAD05EB0605702DFD7208F32D848306B7E4AB10745F20CC7EE89AC2260E6B880C0CA19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(uxtheme.dll,00401967,?), ref: 00401A4E
                                                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 00401A60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: IsThemeActive$uxtheme.dll
                                                                            • API String ID: 2574300362-3542929980
                                                                            • Opcode ID: 21f46e69b30c07e6e70ba4d9a524beab2f2c7279e81fd8ddf14fc835e9b20fb3
                                                                            • Instruction ID: 708e43c0397dec2faf81578261b9723fe63f5f84f826bce0dc18142a9322b586
                                                                            • Opcode Fuzzy Hash: 21f46e69b30c07e6e70ba4d9a524beab2f2c7279e81fd8ddf14fc835e9b20fb3
                                                                            • Instruction Fuzzy Hash: 22D017306003028FC720CF71CC0930776E8AB10345B20C83AE896D22B0E77884C4CE5A
                                                                            APIs
                                                                              • Part of subcall function 00401A43: LoadLibraryA.KERNEL32(uxtheme.dll,00401967,?), ref: 00401A4E
                                                                              • Part of subcall function 00401A43: GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 00401A60
                                                                            • SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 004019D8
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 004019E8
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00401A0E
                                                                            • FreeLibrary.KERNEL32(?), ref: 00401A20
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem$Library$AddressFreeLoadProc
                                                                            • String ID:
                                                                            • API String ID: 3664353960-0
                                                                            • Opcode ID: 3c5e0a68e0cb97ad3966a7a0b48cf8fc1dbc59275a0498ea28b4a9936cf48647
                                                                            • Instruction ID: 4353411602f3a87985f0dd9b24ad5660156ef5563a3a86d4efd7711f3f6935f0
                                                                            • Opcode Fuzzy Hash: 3c5e0a68e0cb97ad3966a7a0b48cf8fc1dbc59275a0498ea28b4a9936cf48647
                                                                            • Instruction Fuzzy Hash: 8A318172508351ABC711DF5ADC85A9BBBE8BF95314F00093FF898632A1C7749984CF5A
                                                                            APIs
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00418CAB
                                                                            • TranslateMessage.USER32(?), ref: 00418CD2
                                                                            • DispatchMessageW.USER32(?), ref: 00418CDC
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00418CEC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Peek$DispatchTranslate
                                                                            • String ID:
                                                                            • API String ID: 1795658109-0
                                                                            • Opcode ID: a88d09abddd65d1de1d546c2f16f606a4bc06f50eec9a3d9c1bb4009f7293071
                                                                            • Instruction ID: 3b1cc05d54707ff613bd0a2dd8511293c23920df9bf20972262f4e1701a0712f
                                                                            • Opcode Fuzzy Hash: a88d09abddd65d1de1d546c2f16f606a4bc06f50eec9a3d9c1bb4009f7293071
                                                                            • Instruction Fuzzy Hash: BB21C3B2909349AEEB52CFB4AC48AF77BACA711308F04453FE442D2151FE6898C5D739
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00409C91
                                                                              • Part of subcall function 0040A282: LoadStringW.USER32(00000065,?,0000007F,0048C258), ref: 0040A2C9
                                                                              • Part of subcall function 0040A282: _memset.LIBCMT ref: 0040A37C
                                                                              • Part of subcall function 0040A282: _wcsncpy.LIBCMT ref: 0040A3A4
                                                                              • Part of subcall function 0040A282: _wcscpy.LIBCMT ref: 0040A3BE
                                                                              • Part of subcall function 0040A282: Shell_NotifyIconW.SHELL32(00000001,?), ref: 0040A441
                                                                            • Shell_NotifyIconW.SHELL32(00000001,00000098), ref: 00409D2F
                                                                            • KillTimer.USER32(?,00000001,0048C258,?,?,00000000), ref: 00409D37
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00409D46
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_Timer_memset$KillLoadString_wcscpy_wcsncpy
                                                                            • String ID:
                                                                            • API String ID: 354902784-0
                                                                            • Opcode ID: c35bfba876e77a39edf666fe6044342eb1fd9abe50f96d8afa92cb147ab3fbd9
                                                                            • Instruction ID: d9ddb8a2899b62e2fcccc16d4d61b92d84fb8850f8fc925c740899af16058ced
                                                                            • Opcode Fuzzy Hash: c35bfba876e77a39edf666fe6044342eb1fd9abe50f96d8afa92cb147ab3fbd9
                                                                            • Instruction Fuzzy Hash: 232199B1448388AEE722DB34DC45BD77BE86F02304F4444EAD18AA72D3D7B85D85DB29
                                                                            APIs
                                                                            • Sleep.KERNEL32(0000000A,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe), ref: 00418FAA
                                                                              • Part of subcall function 00419536: timeGetTime.WINMM ref: 0041954E
                                                                            • GetExitCodeProcess.KERNEL32(0048C1F0,?), ref: 00418FEE
                                                                            • CloseHandle.KERNEL32(0048C1F0,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe), ref: 00418FFF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCodeExitHandleProcessSleepTimetime
                                                                            • String ID:
                                                                            • API String ID: 3939281578-0
                                                                            • Opcode ID: 7f8541a54e5892fc25d5a11e3b0a4fb9da640623ff5ade2c04205f115da9a3c8
                                                                            • Instruction ID: d5a1c2d6ec5c4c0377987a8aa9d25c44ee8dca23f6b4cf511090a599775075bd
                                                                            • Opcode Fuzzy Hash: 7f8541a54e5892fc25d5a11e3b0a4fb9da640623ff5ade2c04205f115da9a3c8
                                                                            • Instruction Fuzzy Hash: 96110131688109AECF26676588283FEBB979B12318F08015FF28412221CFAD5DC7A75F
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00409B6C
                                                                            • _memset.LIBCMT ref: 00409B77
                                                                            • CreateIcon.USER32(00000020,00000020,00000001,00000001,?,?), ref: 00409B98
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CreateIcon
                                                                            • String ID:
                                                                            • API String ID: 913522015-0
                                                                            • Opcode ID: a6f4eb4be2dbcf74017614f2d8138f2798f1f139e78f9c4de7adff749eef7436
                                                                            • Instruction ID: ca4f057dcc6da7ce610f229eb06517835969a7fc3c14e34b9b0d482f9a7ec113
                                                                            • Opcode Fuzzy Hash: a6f4eb4be2dbcf74017614f2d8138f2798f1f139e78f9c4de7adff749eef7436
                                                                            • Instruction Fuzzy Hash: F701D8B2D002186AE710AB56AC85F9FB7ACEB84318F04047FFB04F61D1DAB55884C76C
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __close__flush__freebuf
                                                                            • String ID:
                                                                            • API String ID: 3722736141-0
                                                                            • Opcode ID: 9508790c0e5babfa435479e001925684b776dbef7d572b45be81eac24aa3b25b
                                                                            • Instruction ID: 9d03d284387e27f83df6200fdd7217aede530b946880ce88e7cf6cdacfabfba9
                                                                            • Opcode Fuzzy Hash: 9508790c0e5babfa435479e001925684b776dbef7d572b45be81eac24aa3b25b
                                                                            • Instruction Fuzzy Hash: B0F0C862901B005E86307A7B4D4185BB3DC5E8773AB144B1FFE65D21D3E6AC980E866A
                                                                            APIs
                                                                            • SetFilePointer.KERNEL32(00000000,00004000,00000000,?,00004000,?,00462A0C,?,00000000,00000000), ref: 00459C04
                                                                            • GetLastError.KERNEL32 ref: 00459C11
                                                                            • __dosmaperr.LIBCMT ref: 00459C20
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFileLastPointer__dosmaperr
                                                                            • String ID:
                                                                            • API String ID: 2336955059-0
                                                                            • Opcode ID: 776397c19fed15d58f600e79d9db1e2e02b7b2c6ec9868dbc3e1fc5cacb8085b
                                                                            • Instruction ID: 1421f1653887643186f8ddbe5c170403d0b184ccd9b0dc43b5fda8f8f4b77431
                                                                            • Opcode Fuzzy Hash: 776397c19fed15d58f600e79d9db1e2e02b7b2c6ec9868dbc3e1fc5cacb8085b
                                                                            • Instruction Fuzzy Hash: 2AF0C8326145119ACA115B7DBC0498A37989B8673AB110B57F930CB2E6DB24CC8957AE
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • Sleep.KERNEL32(00000000), ref: 00424EC6
                                                                            • timeGetTime.WINMM ref: 00424ECE
                                                                            • SetProcessWorkingSetSize.KERNEL32(000000FF,000000FF,000000FF), ref: 00424EFD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageProcessSizeSleepTimeWorkingtime
                                                                            • String ID:
                                                                            • API String ID: 3835126801-0
                                                                            • Opcode ID: aed01b4b616c5ee5313be59386696b9fe4da8bec6e5d1f4001601efe91bc8cdd
                                                                            • Instruction ID: 004ce6c9f14faae0c823e9f3b344dba8b273c30769ebcddcf58ef521d3ebcc52
                                                                            • Opcode Fuzzy Hash: aed01b4b616c5ee5313be59386696b9fe4da8bec6e5d1f4001601efe91bc8cdd
                                                                            • Instruction Fuzzy Hash: FDF09A3160C72157D750AB74EC1964B7690EF84338F200B3EF06AD22E1EEBC94408A5A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ___getgmtimebuf
                                                                            • String ID: 9B
                                                                            • API String ID: 1156330120-3820238304
                                                                            • Opcode ID: e885dac88fae3ffb6da2fbc61de371c940828875919641d3891c7ac8b82a247d
                                                                            • Instruction ID: c2c5307adaea5995935e29c016da1468730111ae498a76b748061221494ba3e7
                                                                            • Opcode Fuzzy Hash: e885dac88fae3ffb6da2fbc61de371c940828875919641d3891c7ac8b82a247d
                                                                            • Instruction Fuzzy Hash: 0AC0127755D83515191635BA78024DA02408B417A7701215BF841C5142DA0C8A4B01CD
                                                                            APIs
                                                                            • Sleep.KERNEL32(0000000A,0048BA08,0048BA08,?,0048BA08,?,0041903C,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe), ref: 00437918
                                                                            • timeGetTime.WINMM(?,0048BA08,?,0041903C,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 00437928
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: SleepTimetime
                                                                            • String ID:
                                                                            • API String ID: 346578373-0
                                                                            • Opcode ID: 73fb8afa7d86d284975798a9be7b44cf41ebc75aa5fe7e352d951449fabdd359
                                                                            • Instruction ID: 27ab6f69b115c87ee4efd6f25079fd855adaa97c948d3e7e2dfbe735c757e670
                                                                            • Opcode Fuzzy Hash: 73fb8afa7d86d284975798a9be7b44cf41ebc75aa5fe7e352d951449fabdd359
                                                                            • Instruction Fuzzy Hash: 842137F130C60667F1746A7988C9B7AB640AF0D308F24271BE099D6212CF5D7891D79E
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\regsvr.exe,00000104,0048D8B0,C:\Users\user\Desktop\regsvr.exe,?,?,00406C7E,C:\Users\user\Desktop\regsvr.exe,00000104), ref: 0040C4F9
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0041A3FA
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0041A40C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfileStringWrite$FullMessageNamePath
                                                                            • String ID:
                                                                            • API String ID: 4224191562-0
                                                                            • Opcode ID: b3165dcbec84ba81f13b24983435283c7b45353497ba55dce17d1b7bd077e54f
                                                                            • Instruction ID: 2f3a17eaba5364665d9bd1352509b6a8d37325c63a6a48ab769e670502e24c8d
                                                                            • Opcode Fuzzy Hash: b3165dcbec84ba81f13b24983435283c7b45353497ba55dce17d1b7bd077e54f
                                                                            • Instruction Fuzzy Hash: 4901B5B2A101182BDB11B7754C4AEBF239DDB84328F054577BC05F71C2DA7CED454AA5
                                                                            APIs
                                                                            • InternetCloseHandle.WININET(?), ref: 00421BE0
                                                                            • FreeLibrary.KERNEL32(?), ref: 00421C22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseFreeHandleInternetLibrary
                                                                            • String ID:
                                                                            • API String ID: 2710724954-0
                                                                            • Opcode ID: b4c7338a8d3ec74770c5f944a003518f44762e0fd436aa82190dab9fa4d17abe
                                                                            • Instruction ID: df093ca8ce884c0039315dd9714d505d36a53e17b97302458325ae1eee0d03c3
                                                                            • Opcode Fuzzy Hash: b4c7338a8d3ec74770c5f944a003518f44762e0fd436aa82190dab9fa4d17abe
                                                                            • Instruction Fuzzy Hash: 93113C35A04616AFCB10EF9AE88088DFBB5FF1431479086BAE124E3621C774BD95CB95
                                                                            APIs
                                                                            • HeapCreate.KERNEL32(00000000,00001000,00000000,00453D34,00000001), ref: 00457C68
                                                                            • HeapDestroy.KERNEL32 ref: 00457C9E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$CreateDestroy
                                                                            • String ID:
                                                                            • API String ID: 3296620671-0
                                                                            • Opcode ID: e6b95f09fe93390926c633a42a8f3dee3f5dfadbc4c9cf5d9526afadf555e938
                                                                            • Instruction ID: a77f34462ffdd17000d5cd908b616a03b19893ae351acdac2544d49c104382a2
                                                                            • Opcode Fuzzy Hash: e6b95f09fe93390926c633a42a8f3dee3f5dfadbc4c9cf5d9526afadf555e938
                                                                            • Instruction Fuzzy Hash: 74E0ED71678301AEEB126B31BD4972A3694AB50B8BF10087FFC05C51A5FFA88485960D
                                                                            APIs
                                                                            • __lock.LIBCMT ref: 0045DFAF
                                                                              • Part of subcall function 00455532: __mtinitlocknum.LIBCMT ref: 00455546
                                                                              • Part of subcall function 00455532: __amsg_exit.LIBCMT ref: 00455552
                                                                              • Part of subcall function 00455532: RtlEnterCriticalSection.NTDLL(?), ref: 0045555A
                                                                            • __tzset_nolock.LIBCMT ref: 0045DFC0
                                                                              • Part of subcall function 0045D8AB: __lock.LIBCMT ref: 0045D8CD
                                                                              • Part of subcall function 0045D8AB: __invoke_watson.LIBCMT ref: 0045D8F1
                                                                              • Part of subcall function 0045D8AB: __invoke_watson.LIBCMT ref: 0045D90C
                                                                              • Part of subcall function 0045D8AB: __invoke_watson.LIBCMT ref: 0045D927
                                                                              • Part of subcall function 0045D8AB: ____lc_codepage_func.LIBCMT ref: 0045D92F
                                                                              • Part of subcall function 0045D8AB: _strlen.LIBCMT ref: 0045D98F
                                                                              • Part of subcall function 0045D8AB: __malloc_crt.LIBCMT ref: 0045D996
                                                                              • Part of subcall function 0045D8AB: _strlen.LIBCMT ref: 0045D9AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __invoke_watson$__lock_strlen$CriticalEnterSection____lc_codepage_func__amsg_exit__malloc_crt__mtinitlocknum__tzset_nolock
                                                                            • String ID:
                                                                            • API String ID: 4249203040-0
                                                                            • Opcode ID: a08efd3b4c74185ad907ebfb00f89f76045372d51b901ff08b25fc7a5c7f0228
                                                                            • Instruction ID: 59cc63003c215e045ab64db059d94580f4ee11be83b408d9e0598d97f1642164
                                                                            • Opcode Fuzzy Hash: a08efd3b4c74185ad907ebfb00f89f76045372d51b901ff08b25fc7a5c7f0228
                                                                            • Instruction Fuzzy Hash: 17E086318C0B30E6C631BFA1580652C71616F04737F60816FFC5A115D3CA3805888F5D
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\regsvr.exe,00000104,0048D8B0,C:\Users\user\Desktop\regsvr.exe,?,?,00406C7E,C:\Users\user\Desktop\regsvr.exe,00000104), ref: 0040C4F9
                                                                            • GetPrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?,0000FFFF,?), ref: 0041A36F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FullMessageNamePathPrivateProfileString
                                                                            • String ID:
                                                                            • API String ID: 2293904819-0
                                                                            • Opcode ID: 7ac7ce0f5b8ca6039468c3ba847e0187ea7638d5644e6a267e4d956b3743f0b8
                                                                            • Instruction ID: afdfd4a222a38ee004319feb394522888084550f90ab02918900143d29eaee06
                                                                            • Opcode Fuzzy Hash: 7ac7ce0f5b8ca6039468c3ba847e0187ea7638d5644e6a267e4d956b3743f0b8
                                                                            • Instruction Fuzzy Hash: 4D01B1B26002186ADB21B7754C8A9AF239EDB84329B14457BF805F7582DA3CED498A54
                                                                            APIs
                                                                            • IsWindow.USER32(00000000), ref: 00437AB1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window
                                                                            • String ID:
                                                                            • API String ID: 2353593579-0
                                                                            • Opcode ID: 79f1cb65e0f32e2c55fefa4be7b0d5979f71531f1abff4e515172dfb9aa6aee2
                                                                            • Instruction ID: 9e359bad42108b498ede935d4586e5ccc50791f06e41fd18962da7bc5a959e55
                                                                            • Opcode Fuzzy Hash: 79f1cb65e0f32e2c55fefa4be7b0d5979f71531f1abff4e515172dfb9aa6aee2
                                                                            • Instruction Fuzzy Hash: 3B01C8B26086067ED750AA31DC40DE6FB6CFB44398F000537F459E3151DB39B9658BE4
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset
                                                                            • String ID:
                                                                            • API String ID: 2102423945-0
                                                                            • Opcode ID: dd0292eb844590ae7aec5838017fc10a0592ecf0e5331e2f77dae737590ecce5
                                                                            • Instruction ID: 07d2608a6e7e809214e76f144cb627329647ae2f61a68c34cd360a4fded98e1d
                                                                            • Opcode Fuzzy Hash: dd0292eb844590ae7aec5838017fc10a0592ecf0e5331e2f77dae737590ecce5
                                                                            • Instruction Fuzzy Hash: 8A018031801619EBCF21AFA58D0289F3B71AF09752F00811BFC24151A3D77D8A69DFD9
                                                                            APIs
                                                                            • ClientToScreen.USER32(?,?), ref: 00443111
                                                                            • GetSysColor.USER32(0000000F), ref: 0044312F
                                                                            • SetBkColor.GDI32(?,00000000), ref: 00443145
                                                                            • 74A309A0.COMCTL32 ref: 004431FD
                                                                            • ReleaseCapture.USER32 ref: 00443203
                                                                            • SetWindowTextW.USER32(?,00000000), ref: 004432B6
                                                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 004432C6
                                                                            • FreeLibrary.KERNEL32(?), ref: 004433F9
                                                                            • DragQueryPoint.SHELL32(?,?), ref: 0044340C
                                                                            • SendMessageW.USER32(0048A010,000000B0,?,?), ref: 00443477
                                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00443482
                                                                            • DragQueryFileW.SHELL32(?,?,?,00000104), ref: 004434AD
                                                                            • _wcscat.LIBCMT ref: 004434DE
                                                                            • SendMessageW.USER32(0048A010,000000C2,00000001,?), ref: 004434F5
                                                                            • SendMessageW.USER32(0048A010,000000B0,?,00000000), ref: 00443506
                                                                            • SendMessageW.USER32(0048A010,000000B1,?,00000000), ref: 00443516
                                                                            • SendMessageW.USER32(0048A010,000000B1,?,00000000), ref: 0044353B
                                                                            • DragFinish.SHELL32(?), ref: 00443540
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Drag$Query$ColorFile$A309CaptureClientFinishFreeLibraryPointReleaseScreenTextWindow_wcscat
                                                                            • String ID: ,$@GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$F
                                                                            • API String ID: 2676149128-697031152
                                                                            • Opcode ID: 993c5459f25ed31fe4d180c329fc208f00fa9602aa8913f8b5c431fcf14e507e
                                                                            • Instruction ID: 2f5ca21f466d0c7f14adb5fd58eb00a35839a94604e3799ddf271b1a3d79e7c1
                                                                            • Opcode Fuzzy Hash: 993c5459f25ed31fe4d180c329fc208f00fa9602aa8913f8b5c431fcf14e507e
                                                                            • Instruction Fuzzy Hash: 8DD2A130204341AFEB20DF28C984B6BBBE5FF84714F500A5EF591972A1D7B9E945CB1A
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CharLowerBuffW.USER32(?,?), ref: 00432F7A
                                                                              • Part of subcall function 00410215: _memset.LIBCMT ref: 00410243
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharLowerMessage_memset
                                                                            • String ID: $@$@$align$byte$char$double$dword$float$hwnd$int$int64$int_ptr$long$long_ptr$ptr$short$ubyte$udword$uint$uint64$uint_ptr$ulong$ulong_ptr$ushort$wchar
                                                                            • API String ID: 2326986344-16665901
                                                                            • Opcode ID: e72367f5e4790fb5b6babce893b4319525e075ee07547b6522cb5075420b2f2e
                                                                            • Instruction ID: 76a9f760883b43b550d8287efe5ff65a748cb50c4bbca1b921223ee8b51c25ed
                                                                            • Opcode Fuzzy Hash: e72367f5e4790fb5b6babce893b4319525e075ee07547b6522cb5075420b2f2e
                                                                            • Instruction Fuzzy Hash: 60429131D00618ABDB21DF69C8417EEB7B1BF48305F1084ABE909BB251D7B95E85CF85
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0040979B
                                                                            • IsIconic.USER32(?), ref: 004097A8
                                                                            • ShowWindow.USER32(?,00000009,?,?,75A915B0,?,00000001), ref: 004097B5
                                                                            • SetForegroundWindow.USER32(?), ref: 004097C6
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004097D8
                                                                            • GetCurrentThreadId.KERNEL32 ref: 004097DE
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 004097EA
                                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,75A915B0,?,00000001), ref: 004097FD
                                                                            • AttachThreadInput.USER32(?,?,00000001,?,?,75A915B0,?,00000001), ref: 00409809
                                                                            • AttachThreadInput.USER32(?,?,00000001,?,?,75A915B0,?,00000001), ref: 00409815
                                                                            • SetForegroundWindow.USER32(?), ref: 00409818
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00409829
                                                                            • keybd_event.USER32(00000012,00000000), ref: 00409834
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0040983C
                                                                            • keybd_event.USER32(00000012,00000000), ref: 00409841
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00409848
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0040984D
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00409855
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0040985A
                                                                            • SetForegroundWindow.USER32(?), ref: 00409860
                                                                            • AttachThreadInput.USER32(00000003,?,00000000), ref: 00409885
                                                                            • AttachThreadInput.USER32(00000003,00000003,00000000), ref: 00409890
                                                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0040989B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$Window$AttachInput$Virtualkeybd_event$Foreground$Process$CurrentFindIconicShow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 1293805756-2988720461
                                                                            • Opcode ID: 52c51417e2a545cfa38766acbc20a44171109917dd8e773bbe11aa5087a41122
                                                                            • Instruction ID: 9db30ad53e920ac4545e7fec9f1000412b23fd80184155ad3c302ff893226886
                                                                            • Opcode Fuzzy Hash: 52c51417e2a545cfa38766acbc20a44171109917dd8e773bbe11aa5087a41122
                                                                            • Instruction Fuzzy Hash: 0031B471504309BBDB10AF66CC44F6B7E9DEF857D8F01042AF540921A2D6B6DC149BB7
                                                                            APIs
                                                                            • OpenClipboard.USER32(0046BF68), ref: 00421EDD
                                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00421EEB
                                                                            • GetClipboardData.USER32(0000000D), ref: 00421EF3
                                                                            • CloseClipboard.USER32 ref: 00421EFF
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00421F17
                                                                            • CloseClipboard.USER32 ref: 00421F21
                                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00421F3A
                                                                            • GetClipboardData.USER32(00000001), ref: 00421F42
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00421F4F
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00421F76
                                                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 00421F83
                                                                            • GetClipboardData.USER32(0000000F), ref: 00421F8F
                                                                            • CloseClipboard.USER32 ref: 00421FA0
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00421FAD
                                                                            • CloseClipboard.USER32 ref: 00421FB7
                                                                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00421FCE
                                                                            • DragQueryFileW.SHELL32(?,?,?,00000104), ref: 00421FEE
                                                                            • DragQueryFileW.SHELL32(?,?,?,00000104), ref: 00422022
                                                                            • GlobalUnlock.KERNEL32(?), ref: 00422041
                                                                            • CountClipboardFormats.USER32 ref: 00422067
                                                                            • CloseClipboard.USER32 ref: 00422082
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$CloseGlobal$AvailableDataDragFileFormatLockQuery$Unlock$CountFormatsOpen
                                                                            • String ID:
                                                                            • API String ID: 1467999397-0
                                                                            • Opcode ID: 2cb0fa8f945d83c028d0fecefb5a3bb4a0a16bd23a328e87f83d9dce2012ad3e
                                                                            • Instruction ID: dee9b12acf1d7c0e5d34432ddaea1ab5d71d3f0a61fff10c2d8a619a1ce1d4cd
                                                                            • Opcode Fuzzy Hash: 2cb0fa8f945d83c028d0fecefb5a3bb4a0a16bd23a328e87f83d9dce2012ad3e
                                                                            • Instruction Fuzzy Hash: E751D771704119BBDB10AFA5ED89FAE3768AF14318F110077F611E21A1EBB49E41CB6A
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 0041B5A2
                                                                            • FindClose.KERNEL32(00000000), ref: 0041B5E2
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0041B60E
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0041B625
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0041B64C
                                                                            • __swprintf.LIBCMT ref: 0041B698
                                                                            • __swprintf.LIBCMT ref: 0041B6CF
                                                                            • __swprintf.LIBCMT ref: 0041B6FB
                                                                              • Part of subcall function 0044F059: __woutput_l.LIBCMT ref: 0044F0AC
                                                                            • __swprintf.LIBCMT ref: 0041B724
                                                                              • Part of subcall function 0044F059: __flsbuf.LIBCMT ref: 0044F0CA
                                                                              • Part of subcall function 0044F059: __flsbuf.LIBCMT ref: 0044F0E2
                                                                            • __swprintf.LIBCMT ref: 0041B74D
                                                                            • __swprintf.LIBCMT ref: 0041B776
                                                                            • __swprintf.LIBCMT ref: 0041B79F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstMessageSystem__woutput_l
                                                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                            • API String ID: 1895052877-2428617273
                                                                            • Opcode ID: 2d8e35d287bcfed7e38f3570ac1975c48480ae4dcd4d4152ecbcd59a91fe4261
                                                                            • Instruction ID: 58c41aa100c0c531ca340e54775947fabf3c2dbe4ced7be747fb93faf759285b
                                                                            • Opcode Fuzzy Hash: 2d8e35d287bcfed7e38f3570ac1975c48480ae4dcd4d4152ecbcd59a91fe4261
                                                                            • Instruction Fuzzy Hash: 77617272508304AFC710EFA58845DAF77ECAF89714F00492FF695D3281E6B8D9858BA6
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetLocalTime.KERNEL32(?), ref: 0041B89C
                                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 0041B8AC
                                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0041B8B8
                                                                            • _wcsncpy.LIBCMT ref: 0041B8DF
                                                                            • _wcscat.LIBCMT ref: 0041B93E
                                                                            • _wcscat.LIBCMT ref: 0041B950
                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0041B961
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041B975
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0041B986
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041B9BA
                                                                            • _wcscpy.LIBCMT ref: 0041B9C6
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0041B9FD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Time$CurrentDirectoryFile$Local_wcscat$AttributesMessageSystem_wcscpy_wcsncpy
                                                                            • String ID: *.*
                                                                            • API String ID: 1156724541-438819550
                                                                            • Opcode ID: f03f9563414caf4ffc7010042de2435deb692c6d8151ed44618d7755af116d7e
                                                                            • Instruction ID: cb4f71639a2160c6757a7afe06acb7e7096463695dc5846f498f29438757b29b
                                                                            • Opcode Fuzzy Hash: f03f9563414caf4ffc7010042de2435deb692c6d8151ed44618d7755af116d7e
                                                                            • Instruction Fuzzy Hash: 18514FB25083446BCB20EBA5D885ADB77DCEF85718F000A3FF585D3141EB78D5498BAA
                                                                            APIs
                                                                            • __swprintf.LIBCMT ref: 0041D0E1
                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 0041D131
                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000003,02200000,00000000,00000000,?,?,?,00000000), ref: 0041D155
                                                                            • _memset.LIBCMT ref: 0041D170
                                                                            • _wcsncpy.LIBCMT ref: 0041D1B7
                                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,A0000003,?,00000000,00000000,?,00000000), ref: 0041D1EA
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D1F5
                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,00000000), ref: 0041D1FC
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D206
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileRemove__swprintf_memset_wcsncpy
                                                                            • String ID: :$\$\??\%s
                                                                            • API String ID: 147185268-3457252023
                                                                            • Opcode ID: 01229f154515c0a184b3b42d371d5060e0470ccb71a0a816dd080fc0190f3ee4
                                                                            • Instruction ID: 8a8c1d5972a93648f321550eee670f743a53079bdd3337a3edc54f5173483aeb
                                                                            • Opcode Fuzzy Hash: 01229f154515c0a184b3b42d371d5060e0470ccb71a0a816dd080fc0190f3ee4
                                                                            • Instruction Fuzzy Hash: E531ACB190021C6EDB20EB64DC45FEB77ACBF44308F0041E6F555D2152EB789E898B69
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 0040D2A1
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040D2A8
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040D2C2
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0040D2E1
                                                                            • GetLastError.KERNEL32 ref: 0040D2E7
                                                                            • EnumWindows.USER32(0040D339,00000000), ref: 0040D30C
                                                                            • ExitWindowsEx.USER32(?,00000000), ref: 0040D31E
                                                                            • SetSystemPowerState.KERNEL32(00000000,00000000), ref: 0040D330
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ProcessTokenWindows$AdjustCurrentEnumErrorExitLastLookupOpenPowerPrivilegePrivilegesStateSystemValue
                                                                            • String ID: $ $@$SeShutdownPrivilege
                                                                            • API String ID: 3737638738-3163812486
                                                                            • Opcode ID: d221b141257a1b5a77c5d9165ae56490d43f55f2f625de518dde7a499e688718
                                                                            • Instruction ID: eac26956ff1bed6e971f9e7b7b09c618fe6a40502a3d4a20c72487dc46b2676d
                                                                            • Opcode Fuzzy Hash: d221b141257a1b5a77c5d9165ae56490d43f55f2f625de518dde7a499e688718
                                                                            • Instruction Fuzzy Hash: 3311C471D05225BEE7205BE59D8CBAB7EACDF05394F100076F902E01D0E6B88948C7BA
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _strncmp$_memset
                                                                            • String ID: ACCEPT$DEFINE$Q\E
                                                                            • API String ID: 3584909358-3228910099
                                                                            • Opcode ID: 32d23e6376e96b81a453cc1c6041cf18e8f68d3cc9863617e5092e1ce2dd82f9
                                                                            • Instruction ID: c1e7447fc3f11b16837eced2967d18acf4e8b53fe993750e218afdb34a4b267c
                                                                            • Opcode Fuzzy Hash: 32d23e6376e96b81a453cc1c6041cf18e8f68d3cc9863617e5092e1ce2dd82f9
                                                                            • Instruction Fuzzy Hash: 9C53BE70504289DFEF29CF28C8847AA3BE1BF16304F15415BEC9587392D779D886CB9A
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 004085DF
                                                                            • SetKeyboardState.USER32(?), ref: 00408623
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 00408638
                                                                            • GetKeyState.USER32(00000011), ref: 00408645
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 00408668
                                                                            • GetKeyState.USER32(00000012), ref: 00408670
                                                                            • GetAsyncKeyState.USER32(?), ref: 00408695
                                                                            • GetKeyState.USER32(?), ref: 004086A2
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 004086CD
                                                                            • GetKeyState.USER32(000000A1), ref: 004086D5
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 004086F8
                                                                            • GetKeyState.USER32(0000005B), ref: 00408700
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: 7360a7b56c165d971390acd4bd3d10ae77c4bce19b2045796409b3cf3099cd63
                                                                            • Instruction ID: daa85f2bcad83e4fa999e06a490039027a88e11ba0e292c1260292f71f5e0a3c
                                                                            • Opcode Fuzzy Hash: 7360a7b56c165d971390acd4bd3d10ae77c4bce19b2045796409b3cf3099cd63
                                                                            • Instruction Fuzzy Hash: F4516D30205B409AE7309A398E897E77694AF50788F15483EE9DA773C1DF7EA904CB1D
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0041BA28
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0041BA80
                                                                            • FindClose.KERNEL32(00000000), ref: 0041BA91
                                                                            • FindClose.KERNEL32(00000000), ref: 0041BAA3
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0041BAB9
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0041BB07
                                                                            • SetCurrentDirectoryW.KERNEL32(0046FAA8), ref: 0041BB25
                                                                            • FindNextFileW.KERNEL32(?,00000010), ref: 0041BB31
                                                                            • FindClose.KERNEL32(?), ref: 0041BB44
                                                                              • Part of subcall function 0040C25D: GetFileAttributesW.KERNEL32(?), ref: 0040C264
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Attributes
                                                                            • String ID: *.*
                                                                            • API String ID: 3396039715-438819550
                                                                            • Opcode ID: 292b795b31d98c95004cc2cea4c857d0f8e6e59e6bf4472f4792a00dd828fcc4
                                                                            • Instruction ID: 24112f52db47151e95aa2786c82ce1e44472ccac8df7ef0c03d195ca626b433b
                                                                            • Opcode Fuzzy Hash: 292b795b31d98c95004cc2cea4c857d0f8e6e59e6bf4472f4792a00dd828fcc4
                                                                            • Instruction Fuzzy Hash: 9531D6319042087ADF109FF1EC45AEE77ACEF45364F2001A7F804E2191E779EE899B99
                                                                            APIs
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\regsvr.exe,00000104,0048D8B0,C:\Users\user\Desktop\regsvr.exe,?,?,00406C7E,C:\Users\user\Desktop\regsvr.exe,00000104), ref: 0040C4F9
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040C697
                                                                            • _wcscat.LIBCMT ref: 0040C6B0
                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?), ref: 0040C6F1
                                                                            • _wcscpy.LIBCMT ref: 0040C724
                                                                            • _wcscat.LIBCMT ref: 0040C736
                                                                            • _wcscat.LIBCMT ref: 0040C748
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040C755
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0040C769
                                                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 0040C77A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath_wcscpy
                                                                            • String ID: \*.*
                                                                            • API String ID: 1646789304-1173974218
                                                                            • Opcode ID: b111e6d061cfc11706be453b9723871d6f0b132665ce78fb924a51c4d08c4fa5
                                                                            • Instruction ID: 214debf2cda6567c14c833ab0d974a760c696e7914f813d879f3e4fefbd5b9c4
                                                                            • Opcode Fuzzy Hash: b111e6d061cfc11706be453b9723871d6f0b132665ce78fb924a51c4d08c4fa5
                                                                            • Instruction Fuzzy Hash: 073184724483499AD720DBA4D889DDB77DCAB46314F040B2FF595D3181E739D50C8B6B
                                                                            APIs
                                                                            • __swprintf.LIBCMT ref: 0040D720
                                                                            • __swprintf.LIBCMT ref: 0040D72D
                                                                              • Part of subcall function 0044F059: __woutput_l.LIBCMT ref: 0044F0AC
                                                                            • __wcsicmp.LIBCMT ref: 0040D73A
                                                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 0040D75E
                                                                            • LoadResource.KERNEL32(?,00000000), ref: 0040D76A
                                                                            • LockResource.KERNEL32(00000000), ref: 0040D76D
                                                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 0040D792
                                                                            • LoadResource.KERNEL32(?,00000000), ref: 0040D79B
                                                                            • SizeofResource.KERNEL32(?,?), ref: 0040D7A6
                                                                            • LockResource.KERNEL32(00000000), ref: 0040D7B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicmp__woutput_l
                                                                            • String ID:
                                                                            • API String ID: 1236958983-0
                                                                            • Opcode ID: f10c7e01df551b1d201e3edd110367980da33a9b77f23fe8755f474e4a25e71c
                                                                            • Instruction ID: 98a6d5060e16ede7f432ee4b2633ddf11e0c5f817e7636dd1fde48ecaf2debe4
                                                                            • Opcode Fuzzy Hash: f10c7e01df551b1d201e3edd110367980da33a9b77f23fe8755f474e4a25e71c
                                                                            • Instruction Fuzzy Hash: 4C318D71800209AFDF11DFA1DD44EAE7BB9FB44304F008426F955A22A0E379DDA4DBA9
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • GlobalAlloc.KERNEL32(00000002,?), ref: 004220C5
                                                                            • GlobalLock.KERNEL32(00000000), ref: 004220E6
                                                                            • _wcscpy.LIBCMT ref: 004220F2
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00422101
                                                                            • OpenClipboard.USER32 ref: 0042210D
                                                                            • EmptyClipboard.USER32 ref: 00422113
                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 0042211C
                                                                            • CloseClipboard.USER32 ref: 00422122
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$Global$_wcscpy$AllocCloseDataEmptyLockMessageOpenUnlock
                                                                            • String ID:
                                                                            • API String ID: 1154262185-0
                                                                            • Opcode ID: 4411b4628d2b36a0669a557a4331fcc58edd2813061426db5d04e616cb6d1917
                                                                            • Instruction ID: f57eda6113cd665400d7349620928e2233a8d1cb9c03744da8c07c0f788a121d
                                                                            • Opcode Fuzzy Hash: 4411b4628d2b36a0669a557a4331fcc58edd2813061426db5d04e616cb6d1917
                                                                            • Instruction Fuzzy Hash: AD01D4325081207BD3113BB2AC4EE6F3A68EF45779B00043FF901E6192EEACC945C66E
                                                                            APIs
                                                                            • socket.WS2_32(00000002,00000001,00000006), ref: 00426FED
                                                                            • WSAGetLastError.WS2_32(00000000,00000002,00000001,00000006,?,00000000,00000000), ref: 00426FFB
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • bind.WS2_32(00000000,?,00000010), ref: 00427012
                                                                            • listen.WS2_32(00000000,00000005), ref: 00427020
                                                                            • WSAGetLastError.WS2_32(00000000,00000002,00000001,00000006,?,00000000,00000000), ref: 0042702E
                                                                            • closesocket.WS2_32(00000000), ref: 0042703D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$Messagebindclosesocketlistensocket
                                                                            • String ID:
                                                                            • API String ID: 158358722-0
                                                                            • Opcode ID: 98a8e7fd46ebe0775f59dfc51cdfd106aaa9d1d730ed189c368ace39ee607ec9
                                                                            • Instruction ID: 699dfbc0ac604ad5be8f0202c243b2e73cd09f844bd0362dfc5d0cd4353c2c47
                                                                            • Opcode Fuzzy Hash: 98a8e7fd46ebe0775f59dfc51cdfd106aaa9d1d730ed189c368ace39ee607ec9
                                                                            • Instruction Fuzzy Hash: 0811E63174513466EB20B6B91D53BAF22894F4432CF55023FB512F72C3DA7C8D4906AE
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CoInitialize.OLE32(00000000), ref: 0041D26F
                                                                            • CoCreateInstance.COMBASE(004677D0,00000000,00000001,004677C0,?), ref: 0041D286
                                                                            • _wcsncpy.LIBCMT ref: 0041D43B
                                                                            • CoUninitialize.COMBASE ref: 0041D480
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstanceMessageUninitialize_wcsncpy
                                                                            • String ID: .lnk
                                                                            • API String ID: 838818076-24824748
                                                                            • Opcode ID: 05c1c78da8f0ba36ca674eb95acefe979179947d5e444b713e591e29b4e4fb3e
                                                                            • Instruction ID: 05159cdee131f500c309a8ade47987847498d9fb3c13d4dc48e9b25da1553829
                                                                            • Opcode Fuzzy Hash: 05c1c78da8f0ba36ca674eb95acefe979179947d5e444b713e591e29b4e4fb3e
                                                                            • Instruction Fuzzy Hash: 32817E71E00208ABDB10EBB1C846AAE7775EF44319F1444BAE902FB291D778AE84CF54
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000001,00000000), ref: 0041EA9C
                                                                            • Sleep.KERNEL32(0000000A), ref: 0041EAC9
                                                                            • FindNextFileW.KERNEL32(00000001,?), ref: 0041EB9D
                                                                            • FindClose.KERNEL32(00000001), ref: 0041EBB4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNextSleep
                                                                            • String ID: *.*
                                                                            • API String ID: 1749430636-438819550
                                                                            • Opcode ID: a4b33008cc78126f54786bfa852d861979d2c699a2c62dd7eb7d346323ff5308
                                                                            • Instruction ID: 2327df8b8f53aab0c3134182f450212502a6b77773297c3beefd8ddadd9bea59
                                                                            • Opcode Fuzzy Hash: a4b33008cc78126f54786bfa852d861979d2c699a2c62dd7eb7d346323ff5308
                                                                            • Instruction Fuzzy Hash: 7A41B035808219AFDF10DFA2CC45ADE7BB4FF00314F1444ABF845A2291E738AE95CB99
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • MkParseDisplayName.OLE32(?,00000000,?,?), ref: 004287BD
                                                                            • OleInitialize.OLE32(00000000), ref: 004286C0
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • CreateBindCtx.OLE32(00000000,?), ref: 00428769
                                                                            • CLSIDFromProgID.COMBASE(00000000,?), ref: 00428860
                                                                            • GetActiveObject.OLEAUT32(?,00000000,?), ref: 00428886
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ActiveBindCreateDisplayFromInitializeMessageNameObjectParseProg_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 1569849523-0
                                                                            • Opcode ID: 27d15a50f8c44f8f59b0af0c4012518d0fa12db0eb6c7fc0176fab6984cc62f8
                                                                            • Instruction ID: 45edd711b8b18184e34cf7b4839159bad7bf288c39f976c69955b8c122c35607
                                                                            • Opcode Fuzzy Hash: 27d15a50f8c44f8f59b0af0c4012518d0fa12db0eb6c7fc0176fab6984cc62f8
                                                                            • Instruction Fuzzy Hash: 36719A71609204AFD700EFA2EC8586FB7E9EF84358F50493EF54197251EA38DC058B5A
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 004271B1: inet_addr.WS2_32(00000000), ref: 004271C8
                                                                            • socket.WS2_32(00000002,00000002,00000011), ref: 0042759F
                                                                            • WSAGetLastError.WS2_32(00000000,00000002,00000002,00000011,?,?,00000000,00000000), ref: 004275C0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastMessageinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 479597090-0
                                                                            • Opcode ID: f9a3a56ba54ef09390b4cb4b8d6849d27d51f7a379371b9992dc1a754c172aa0
                                                                            • Instruction ID: 012d38f13155d9979b1bcb4aafed225c22acb24815c66ea21bf13d4a11b49de6
                                                                            • Opcode Fuzzy Hash: f9a3a56ba54ef09390b4cb4b8d6849d27d51f7a379371b9992dc1a754c172aa0
                                                                            • Instruction Fuzzy Hash: A431B532B08214BBEB14B7B69C87AAE6795DF40728F15012FF900AB2C2DDBC5D81565D
                                                                            APIs
                                                                              • Part of subcall function 00437A84: IsWindow.USER32(00000000), ref: 00437AB1
                                                                            • IsWindowVisible.USER32 ref: 00439F9F
                                                                            • IsWindowEnabled.USER32 ref: 00439FAD
                                                                            • GetForegroundWindow.USER32(?,?,00000001), ref: 00439FBA
                                                                            • IsIconic.USER32 ref: 00439FC8
                                                                            • IsZoomed.USER32 ref: 00439FD6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                            • String ID:
                                                                            • API String ID: 292994002-0
                                                                            • Opcode ID: 0d919f308e6d7fae4b629042cde9fa380d4e273c503d748488680d10b526d4d0
                                                                            • Instruction ID: 7f13033eb011558cad701ce4ec7d28c70aed03c416c9c99ba4a8819bc7b5e466
                                                                            • Opcode Fuzzy Hash: 0d919f308e6d7fae4b629042cde9fa380d4e273c503d748488680d10b526d4d0
                                                                            • Instruction Fuzzy Hash: 240128313086016FE7206B7A4C84A2F2A9DBF98719F14603BF005D2152EBECCD41866E
                                                                            APIs
                                                                              • Part of subcall function 0040D4F7: __wcsicmp.LIBCMT ref: 0040D507
                                                                              • Part of subcall function 0040D4F7: __wcsicmp.LIBCMT ref: 0040D51C
                                                                              • Part of subcall function 0040BBB0: RegOpenKeyExW.ADVAPI32(?,?,00000000,00000001,00000000,?,?,?,0042E784,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,00000104,%.3d,?,?), ref: 0040BBCF
                                                                              • Part of subcall function 0040BBB0: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?,?,?,0042E784,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,00000104,%.3d,?,?), ref: 0040BBE6
                                                                              • Part of subcall function 0040BBB0: RegCloseKey.ADVAPI32(00000000,?,?,0042E784,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,00000104,%.3d,?,?,?,?,?,?,00000000), ref: 0040BBF7
                                                                            • mouse_event.USER32(00000000,00000000,00000000,00000000,00000000), ref: 0040D421
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$CloseOpenQueryValuemouse_event
                                                                            • String ID: 1$Control Panel\Mouse$SwapMouseButtons
                                                                            • API String ID: 3324267174-1333076132
                                                                            • Opcode ID: 1e88b7714b173cf6c3b0cc5a66203ead5aaaed453d0b375e4da4f3ac8702420b
                                                                            • Instruction ID: c315c89092b364021b1f242551d70469bea58c1b1c5b3e0d6c28d640509d77e2
                                                                            • Opcode Fuzzy Hash: 1e88b7714b173cf6c3b0cc5a66203ead5aaaed453d0b375e4da4f3ac8702420b
                                                                            • Instruction Fuzzy Hash: 7901DB6AE503157EE3001AF19CC6F7B21ACD74435DF644536FA42F10C1F1F86E8A906A
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004639E7
                                                                            • UnhandledExceptionFilter.KERNEL32(0046B514), ref: 004639F2
                                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00463A0E
                                                                            • TerminateProcess.KERNEL32(00000000), ref: 00463A15
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                                                                            • String ID:
                                                                            • API String ID: 3231755760-0
                                                                            • Opcode ID: 4979439936a776235a93f9a19cb7d9785398a8088a8285f7750502a1813f2190
                                                                            • Instruction ID: 8b3e446ca19cc36fbbc20ebe44a95eceae9e0a649eff50c0dce4826641b66d3f
                                                                            • Opcode Fuzzy Hash: 4979439936a776235a93f9a19cb7d9785398a8088a8285f7750502a1813f2190
                                                                            • Instruction Fuzzy Hash: CA21CBB4941304AFDB50EF69EC496943BB8BB0C308F1045BAE80D962B1E7B559C4CF4E
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 0041E052
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0041E09E
                                                                            • FindClose.KERNEL32(00000000,000000FF,00000000), ref: 0041E0BE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstMessageNext
                                                                            • String ID:
                                                                            • API String ID: 1079436330-0
                                                                            • Opcode ID: d948c1c33bacb28f1de7d0caf43a6975e20b7644f0799607c21d02d75e319b99
                                                                            • Instruction ID: eab778f33daa9bb538d06aee4b07686b3da3b46dbd4970fe2a4dad36cd629182
                                                                            • Opcode Fuzzy Hash: d948c1c33bacb28f1de7d0caf43a6975e20b7644f0799607c21d02d75e319b99
                                                                            • Instruction Fuzzy Hash: 4B410036608200AFD710EF66C88599A77E5FF49324F00042FFC5597292DB78FC848B6A
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0041C98D
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000000), ref: 0041CA26
                                                                            • FreeLibrary.KERNEL32(?), ref: 0041CA77
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Free$DiskErrorLibraryMessageModeSpace
                                                                            • String ID:
                                                                            • API String ID: 2448952623-0
                                                                            • Opcode ID: 78510be7b04eccd4f7aa7240b23a080cbd9bb8ee1e31a8de61214c895740685b
                                                                            • Instruction ID: 19cd6573f061630c8903b0e4d96ba3736733aee78d7086a91853b534bd8eaff7
                                                                            • Opcode Fuzzy Hash: 78510be7b04eccd4f7aa7240b23a080cbd9bb8ee1e31a8de61214c895740685b
                                                                            • Instruction Fuzzy Hash: 84314D72940108ABCF05EFA5DD859EEB7B8FF04354B01852BF901B7251DB78AE85CB58
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _strncmp
                                                                            • String ID: {0,
                                                                            • API String ID: 909875538-1249576115
                                                                            • Opcode ID: 7e89a20008915c3ecc948d57da9ad9e54ad97ab3f44c4c0d1fcdc65f34d9870d
                                                                            • Instruction ID: 17f535e6b075d271493b319b15babdeace80fb1c44ce839b2010ffb58041e355
                                                                            • Opcode Fuzzy Hash: 7e89a20008915c3ecc948d57da9ad9e54ad97ab3f44c4c0d1fcdc65f34d9870d
                                                                            • Instruction Fuzzy Hash: E0122630604E855BFF398E2884C863E7751EB02714F38861BD862C67D3D66CED82D65E
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 0041BB76
                                                                            • FindClose.KERNEL32(00000000), ref: 0041BB9A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirstMessage
                                                                            • String ID:
                                                                            • API String ID: 3205698159-0
                                                                            • Opcode ID: 29576fd3ad17671ce72850942685154a4a95fd2c68fe6b5c673d3374ef2937c8
                                                                            • Instruction ID: 303933298d37fa535bc89766d4ae429e119cd19a799f999609cd0fdabb163fee
                                                                            • Opcode Fuzzy Hash: 29576fd3ad17671ce72850942685154a4a95fd2c68fe6b5c673d3374ef2937c8
                                                                            • Instruction Fuzzy Hash: 160126726181002BCB14A7B49C0A9AB33C8DF88335F00072BFC55D72C0EA78EC4086D9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset
                                                                            • String ID:
                                                                            • API String ID: 2102423945-0
                                                                            • Opcode ID: b7ba42e6f83d875a51634b9e11098d6bdb47c6090a43f3453bfe0cb3fff1ce81
                                                                            • Instruction ID: 419ca9e02455fc7b7c1feb05e127d2d1ecc4ac4517371b0bf155143c9b1c1c20
                                                                            • Opcode Fuzzy Hash: b7ba42e6f83d875a51634b9e11098d6bdb47c6090a43f3453bfe0cb3fff1ce81
                                                                            • Instruction Fuzzy Hash: 3C22847BE516169BDB08CA95CC805E9B3E3BBC832471F9179C919E3305EE797A0786C0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ERCP
                                                                            • API String ID: 0-1384759551
                                                                            • Opcode ID: 00af32fa6fbdd41b28502c8f187f9564ed7e29f62218ac181aac72e0a6d43574
                                                                            • Instruction ID: d1a9b71b6aa19ae6caf09824edfab2ba454b1006507bae748ad2bb1b12bcaab9
                                                                            • Opcode Fuzzy Hash: 00af32fa6fbdd41b28502c8f187f9564ed7e29f62218ac181aac72e0a6d43574
                                                                            • Instruction Fuzzy Hash: D642AF70D00649CFEF28CF59C8806AE7BF2BF55314F28412BE86696391D379D885CB59
                                                                            APIs
                                                                            • __time64.LIBCMT ref: 0041191B
                                                                              • Part of subcall function 00452F3F: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,0041289C,00000000,00000000,?,?,?,00412C3C,?,00000000), ref: 00452F48
                                                                              • Part of subcall function 00452F3F: __aulldiv.LIBCMT ref: 00452F68
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Time$FileSystem__aulldiv__time64
                                                                            • String ID:
                                                                            • API String ID: 2893107130-0
                                                                            • Opcode ID: dd79ffdb2c076c8171b0f8cfbc02ddd1c7dc06ca21e2768bafe19140a8e171f3
                                                                            • Instruction ID: 9e30d3db8714523ca3dabb9b6bf04bcd2ce44348211c2002315bcbfc56628793
                                                                            • Opcode Fuzzy Hash: dd79ffdb2c076c8171b0f8cfbc02ddd1c7dc06ca21e2768bafe19140a8e171f3
                                                                            • Instruction Fuzzy Hash: 7A21B373214B058FE728CF65D8C069AB3E2EBC8310F258E3DD2A543340C7B5A949CB98
                                                                            APIs
                                                                            • GetUserNameW.ADVAPI32(?,?), ref: 0042ED84
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: NameUser
                                                                            • String ID:
                                                                            • API String ID: 2645101109-0
                                                                            • Opcode ID: 7cc496694b18207bd3178febef2e6378c16ccb0dfd12fc0a4e99eae989037805
                                                                            • Instruction ID: e095174375131c4a836fc38e35d518248cf96b1c3da38f52dd67506720fb4b9a
                                                                            • Opcode Fuzzy Hash: 7cc496694b18207bd3178febef2e6378c16ccb0dfd12fc0a4e99eae989037805
                                                                            • Instruction Fuzzy Hash: 79C04CB1404018AFC750CFC0D8889CD7BBCAB04344F1001D2E205D1010DB7456849B26
                                                                            APIs
                                                                            • keybd_event.USER32(?,?,?,00000000), ref: 0040838F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: keybd_event
                                                                            • String ID:
                                                                            • API String ID: 2665452162-0
                                                                            • Opcode ID: 0479c103f2eca304b2ceb9ef9286318d1008d58df40571a74abf799f94d68d10
                                                                            • Instruction ID: dc3bc0c10ad9ce968133ae8ad726df65831a45a0230fe7c1bd6b063b48a31fa5
                                                                            • Opcode Fuzzy Hash: 0479c103f2eca304b2ceb9ef9286318d1008d58df40571a74abf799f94d68d10
                                                                            • Instruction Fuzzy Hash: A0B09232108382EBCB02CF50CC04F1EBBA2BB94300F040C1CF2A0400B083628028EB07
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0005EA38), ref: 0045EA7A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 75e6696888ec08c50a34228201fdfdf3540764a583854191e4a951138a0ebaf5
                                                                            • Instruction ID: ef5df3b709a5e3eb5a347aaacd005bd6ca54480151cdc03e4db224316e4b1d6c
                                                                            • Opcode Fuzzy Hash: 75e6696888ec08c50a34228201fdfdf3540764a583854191e4a951138a0ebaf5
                                                                            • Instruction Fuzzy Hash: 8590026025610047974417769C1950565906A8CA0775146E1F441C5095EBA9454C561A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message
                                                                            • String ID:
                                                                            • API String ID: 2030045667-0
                                                                            • Opcode ID: 19722718d04c2d14846d86f895a2a6d455a65963d3380b94437d21885ec5e027
                                                                            • Instruction ID: 4a1ef88e1589eae8da01e7ad87d25acf379cf9c68f71bbcf6a7540ab9e77ce14
                                                                            • Opcode Fuzzy Hash: 19722718d04c2d14846d86f895a2a6d455a65963d3380b94437d21885ec5e027
                                                                            • Instruction Fuzzy Hash: 5BE1D17250C301ABC720EF66C88155FF3E5EF88354F21982FF595A3291DB38D9498B9A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                            • Instruction ID: 99f7f10c7316344e848e26dfda4d2667c7719398b7900840cafa12e7e20f0f44
                                                                            • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                            • Instruction Fuzzy Hash: 21D19E77C1E9B30A9735812D416863FEA626FD174231FC3E29CD43F38AE22A9D0995D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                            • Instruction ID: 96d664f7d1dcdac2e4e521c84f55a9d3d7349b19ff02ab53d5e08204459e11e7
                                                                            • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                            • Instruction Fuzzy Hash: 45D16E77C1E9B30A9735812D416813FEA626FD175231EC3E2DCD42F38AD22B5D0996D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                            • Instruction ID: 6f375554309336eeac528a7103455ea8478b38036a0b6af1aeedbc017cec44fb
                                                                            • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                            • Instruction Fuzzy Hash: 8FC17F73C1E9B30AA736812D416822BEE626FD1B5132FC3F28CD43F389D62A5D0995D4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                                            • Instruction ID: 7a65da6bf613f9bb8e473bf5c7591bdcf87583dca7b78087dbc7c6c02012e0b5
                                                                            • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                                            • Instruction Fuzzy Hash: B6C16E73D1E9B30AA735812D416822BEE626FD174132FC7F28CD43F389D62A9D0996D4
                                                                            APIs
                                                                            • DeleteObject.GDI32(?), ref: 00423D3F
                                                                            • DeleteObject.GDI32(?), ref: 00423D51
                                                                            • GetDesktopWindow.USER32 ref: 00423D7A
                                                                            • GetWindowRect.USER32(00000000), ref: 00423D81
                                                                            • SetRect.USER32(?,00000000,00000000,00000190,00000190), ref: 00423ECA
                                                                            • AdjustWindowRectEx.USER32(?,000001F4,00000000,00000008), ref: 00423EDE
                                                                            • CreateWindowExW.USER32(50000001,AutoIt v3,00000000,?,?,?,?,?,00000000,00000000,00000000), ref: 00423F2D
                                                                            • GetClientRect.USER32(00000000,?), ref: 00423F3A
                                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00423F7E
                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00423FA2
                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00423FB5
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00423FC2
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00423FCB
                                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00423FDD
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00423FE4
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00423FEB
                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,000001F4), ref: 00423FF9
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00467900,00000008), ref: 0042400F
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00424020
                                                                            • CopyImage.USER32(000000FF,00000000,00000000,00000000,00002000), ref: 00424049
                                                                            • SendMessageW.USER32(00000190,00000172,00000000,000000FF), ref: 0042406B
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020), ref: 00424095
                                                                            • ShowWindow.USER32(00000004), ref: 00424295
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Global$CreateRect$File$DeleteObject$AdjustAllocClientCloseCopyDesktopFreeHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                                            • API String ID: 975859826-2373415609
                                                                            • Opcode ID: 2b09211e7e44bf86d371f8236a2e475e7afdc18bbc51e33279854b6804c54a78
                                                                            • Instruction ID: 5a2b41cacd74cee0eeddb1a309b5794dc4dc712594057e42de9f7c9c30022f30
                                                                            • Opcode Fuzzy Hash: 2b09211e7e44bf86d371f8236a2e475e7afdc18bbc51e33279854b6804c54a78
                                                                            • Instruction Fuzzy Hash: 65F18A71208300AFC7119F65EC89E5F7BA9FBC5718F100A2EF545D62A0DB789944CF6A
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000136,?,?), ref: 004436E6
                                                                            • GetSysColorBrush.USER32(00000005), ref: 004436F7
                                                                            • GetClientRect.USER32(?,?), ref: 00443707
                                                                            • SetViewportOrgEx.GDI32(?,00000000,00000000,?), ref: 0044371A
                                                                            • FillRect.USER32(?,?,?), ref: 00443724
                                                                            • SetViewportOrgEx.GDI32(?,?,?,00000000), ref: 00443732
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: RectViewport$BrushClientColorFillMessageSend
                                                                            • String ID: COMBOBOX$EDIT
                                                                            • API String ID: 636829656-1358951209
                                                                            • Opcode ID: b7ad24ec7461ab1d5b40876b0c0e816cfad1ba2e24413f9bcc575e5ced6f7742
                                                                            • Instruction ID: f60723e7cb37dd53a6b4b075965b17748cdd00ccdd27f19a6f9731de42e5291e
                                                                            • Opcode Fuzzy Hash: b7ad24ec7461ab1d5b40876b0c0e816cfad1ba2e24413f9bcc575e5ced6f7742
                                                                            • Instruction Fuzzy Hash: 56A1A1B1904109BBEF10AFA4CC49DBF7BB8FB44B16F10452BF511E21A0D7B89A41DB69
                                                                            APIs
                                                                            • GetSysColor.USER32(0000000E), ref: 0043B2C4
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0043B2CC
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0043B2FF
                                                                            • GetSysColor.USER32(0000000F), ref: 0043B30A
                                                                            • SetBkColor.GDI32(?,?), ref: 0043B321
                                                                            • SelectObject.GDI32(?,?), ref: 0043B32E
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0043B352
                                                                            • GetSysColor.USER32(00000010), ref: 0043B35A
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 0043B361
                                                                            • FrameRect.USER32(?,?,00000000), ref: 0043B36F
                                                                            • DeleteObject.GDI32(00000000), ref: 0043B376
                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0043B3BA
                                                                            • FillRect.USER32(?,00000000,?), ref: 0043B3E6
                                                                              • Part of subcall function 0043B073: GetSysColor.USER32(0000000E), ref: 0043B096
                                                                              • Part of subcall function 0043B073: SetTextColor.GDI32(?,00000000), ref: 0043B09E
                                                                              • Part of subcall function 0043B073: GetSysColorBrush.USER32(0000000F), ref: 0043B0D4
                                                                              • Part of subcall function 0043B073: GetSysColor.USER32(0000000F), ref: 0043B0E0
                                                                              • Part of subcall function 0043B073: GetSysColor.USER32(00000011), ref: 0043B101
                                                                              • Part of subcall function 0043B073: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043B113
                                                                              • Part of subcall function 0043B073: SelectObject.GDI32(?,00000000), ref: 0043B125
                                                                              • Part of subcall function 0043B073: SetBkColor.GDI32(?,?), ref: 0043B12D
                                                                              • Part of subcall function 0043B073: SelectObject.GDI32(?,?), ref: 0043B13C
                                                                              • Part of subcall function 0043B073: InflateRect.USER32(?,000000FF,000000FF), ref: 0043B15A
                                                                              • Part of subcall function 0043B073: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0043B175
                                                                              • Part of subcall function 0043B073: SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0043B1A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameMessageRoundSendSolid
                                                                            • String ID:
                                                                            • API String ID: 3518701105-0
                                                                            • Opcode ID: 0533276530adacccae846a56c3da604de840992734d7747995cc1103325c580f
                                                                            • Instruction ID: eacbbd93d290d1305c25667a405b49048293e7a4ccb2cf3444725ab31638cf18
                                                                            • Opcode Fuzzy Hash: 0533276530adacccae846a56c3da604de840992734d7747995cc1103325c580f
                                                                            • Instruction Fuzzy Hash: 91819571904218BFDF009FA4DD48BAE7B79FF09325F105625FA22A61E1DBB49900CFA5
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,0046BF68,00000000), ref: 004389C5
                                                                            • IsWindowVisible.USER32(?), ref: 00438A04
                                                                              • Part of subcall function 0040FB8E: VariantClear.OLEAUT32(?), ref: 0040FBA8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharClearUpperVariantVisibleWindow
                                                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                            • API String ID: 2091539424-3192792913
                                                                            • Opcode ID: 4e304207229060f6a8fe5b81bfd165573cc00fb733e09b7ae8457d65a9247d37
                                                                            • Instruction ID: 54703a002f8c0825350e3215c3964613f5a77faeef7d7c635890b4e4b9d05a6d
                                                                            • Opcode Fuzzy Hash: 4e304207229060f6a8fe5b81bfd165573cc00fb733e09b7ae8457d65a9247d37
                                                                            • Instruction Fuzzy Hash: 5602B571509341AACB10EB229C1299EFBD5AF84718F145C2FF981671E2CA7CEE49C74B
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp
                                                                            • String ID: byte$double$dword$float$hwnd$int$int64$int_ptr$long$long_ptr$lparam$ptr$short$short_ptr$str$string$ubyte$udword$uint$uint64$ulong$ushort$wparam$wstr$wstring
                                                                            • API String ID: 1389419275-2360294291
                                                                            • Opcode ID: e20a7a8c898528fb15959e6307df9106fd5e27b03aaef31268894924e4b980c2
                                                                            • Instruction ID: cc7fb32c10f8ae844be6410042f29a9dd87a4101036cdfb3b37b634852c545a8
                                                                            • Opcode Fuzzy Hash: e20a7a8c898528fb15959e6307df9106fd5e27b03aaef31268894924e4b980c2
                                                                            • Instruction Fuzzy Hash: 43E14471D00A18AFDB62CF69C8406DAF7B2BF49304F1184BAE90CBB250D7B56E858F45
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0042E600
                                                                            • _memset.LIBCMT ref: 0042E61A
                                                                            • __time64.LIBCMT ref: 0042E62A
                                                                              • Part of subcall function 00452F3F: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,0041289C,00000000,00000000,?,?,?,00412C3C,?,00000000), ref: 00452F48
                                                                              • Part of subcall function 00452F3F: __aulldiv.LIBCMT ref: 00452F68
                                                                              • Part of subcall function 004538B7: ___getgmtimebuf.LIBCMT ref: 004538B8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Time_memset$FileSystem___getgmtimebuf__aulldiv__time64
                                                                            • String ID: %.2d$%.3d$AppData$Common AppData$Common Desktop$Common Documents$Common Favorites$Common Programs$Common Start Menu$Common Startup$CommonFilesDir$Desktop$Favorites$Personal$ProgramFilesDir$Programs$SOFTWARE\Microsoft\Windows\CurrentVersion$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$Start Menu$Startup$[
                                                                            • API String ID: 336630601-4249181872
                                                                            • Opcode ID: 972029c7e6779dd60ef78ca65297c7fc2769076e231a87d4a9709b905e1645aa
                                                                            • Instruction ID: df3ea55ad96c244b6a8076539f86d5f723fc9f56cd4a72a95d85125ed6c001a6
                                                                            • Opcode Fuzzy Hash: 972029c7e6779dd60ef78ca65297c7fc2769076e231a87d4a9709b905e1645aa
                                                                            • Instruction Fuzzy Hash: BD913BB1E04218FBDB10AA45DC86FDA7278DB40704FA041A7F509731A2C7BD6E85DB5E
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0043F864
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0043F925
                                                                            • SendMessageW.USER32(?,00001102,00000002,00000000), ref: 0043F93C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window
                                                                            • String ID: ,$@
                                                                            • API String ID: 2326795674-1227015840
                                                                            • Opcode ID: b2bf5e3f4a9a97ad638c3ca0f974d9dcc644e3f846ed250fff31c102546a7694
                                                                            • Instruction ID: 00488ac51f168e85f48a4a41819b5285716db2923b387bdf7ae57f221dd1ae19
                                                                            • Opcode Fuzzy Hash: b2bf5e3f4a9a97ad638c3ca0f974d9dcc644e3f846ed250fff31c102546a7694
                                                                            • Instruction Fuzzy Hash: 1F02E271908305AFEB21CF14C845BABBBE0BF48314F14592EF9959A3E1C778D948CB5A
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,00000007,00000000,0000002C), ref: 0040A574
                                                                            • GetMenuItemCount.USER32(0048C258), ref: 0040A606
                                                                            • GetMenuItemCount.USER32(00000000), ref: 0040A690
                                                                            • InsertMenuItemW.USER32(00000000,00000000,00000001,0000002C), ref: 0040A6A7
                                                                            • GetMenuItemCount.USER32(0048CD9C), ref: 0040A74E
                                                                            • InsertMenuItemW.USER32(00000000,00000000,00000001,0000002C), ref: 0040A765
                                                                            • GetMenuItemCount.USER32(00000000), ref: 0040A800
                                                                            • InsertMenuItemW.USER32(00000000,00000000,00000001,0000002C), ref: 0040A817
                                                                            • GetMenuItemCount.USER32(0048CB94), ref: 0040A8BE
                                                                            • InsertMenuItemW.USER32(00000000,00000000,00000001,0000002C), ref: 0040A8D5
                                                                            • DeleteMenu.USER32(0048C258,00000005,00000000,000000F5,?,?,00000000), ref: 0040A910
                                                                            • DeleteMenu.USER32(0048C258,00000004,00000000,?,00000000), ref: 0040A917
                                                                            • DeleteMenu.USER32(0048C258,00000006,00000000,?,00000000), ref: 0040A91E
                                                                            • DeleteMenu.USER32(0048C258,00000003,00000000,?,00000000), ref: 0040A925
                                                                            • GetMenuItemCount.USER32(0048C258), ref: 0040A92D
                                                                            • SetMenuItemInfoW.USER32(0048C258,00000004,00000000,0000002C), ref: 0040A967
                                                                            • GetCursorPos.USER32(?), ref: 0040A971
                                                                            • SetForegroundWindow.USER32(00000000), ref: 0040A97A
                                                                            • TrackPopupMenuEx.USER32(0048C258,00000000,?,?,00000000,00000000,?,00000000), ref: 0040A98D
                                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0040A999
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$Count$DeleteInsert$Info$CursorForegroundMessagePopupPostTrackWindow
                                                                            • String ID: ,$,$2$@
                                                                            • API String ID: 4135860720-2197200914
                                                                            • Opcode ID: dca4f05e9d638e47e61285f09b043bc7fe68d0b8eb856ddbcbfd0f23d971bdf1
                                                                            • Instruction ID: f6c71faadf5081e2cd545e52bd7fb6e241f51b226af98ade640f6b89fe65ec49
                                                                            • Opcode Fuzzy Hash: dca4f05e9d638e47e61285f09b043bc7fe68d0b8eb856ddbcbfd0f23d971bdf1
                                                                            • Instruction Fuzzy Hash: 95F1B070900344EFEB21DF68C888B9EBBF5BF04318F14852AE465AB2D0D7B99954CF56
                                                                            APIs
                                                                            • GetSysColor.USER32(0000000E), ref: 0043B096
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0043B09E
                                                                            • GetSysColor.USER32(00000012), ref: 0043B0B8
                                                                            • SetTextColor.GDI32(?,?), ref: 0043B0C0
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0043B0D4
                                                                            • GetSysColor.USER32(0000000F), ref: 0043B0E0
                                                                            • CreateSolidBrush.GDI32(?), ref: 0043B0EB
                                                                            • GetSysColor.USER32(00000011), ref: 0043B101
                                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043B113
                                                                            • SelectObject.GDI32(?,00000000), ref: 0043B125
                                                                            • SetBkColor.GDI32(?,?), ref: 0043B12D
                                                                            • SelectObject.GDI32(?,?), ref: 0043B13C
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0043B15A
                                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0043B175
                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0043B1A7
                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 0043B1D3
                                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0043B1F5
                                                                            • DrawFocusRect.USER32(?,?), ref: 0043B201
                                                                            • GetSysColor.USER32(00000011), ref: 0043B210
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0043B218
                                                                            • DrawTextW.USER32(?,?,000000FF,?,?), ref: 0043B22E
                                                                            • SelectObject.GDI32(?,?), ref: 0043B243
                                                                            • DeleteObject.GDI32(?), ref: 0043B24F
                                                                            • SelectObject.GDI32(?,?), ref: 0043B256
                                                                            • DeleteObject.GDI32(?), ref: 0043B25C
                                                                            • SetTextColor.GDI32(?,?), ref: 0043B263
                                                                            • SetBkColor.GDI32(?,?), ref: 0043B26E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflate$FocusMessageRoundSendSolidWindow
                                                                            • String ID:
                                                                            • API String ID: 1441705042-0
                                                                            • Opcode ID: 85398f20050d7633c1c7966badbb3a5e93d4f8cf590a8cf1c85cb1c316e13ff3
                                                                            • Instruction ID: 3b74116fd13b2b6e60d3972453a419fe497846dcca1a02ba61a3bb4539d5546b
                                                                            • Opcode Fuzzy Hash: 85398f20050d7633c1c7966badbb3a5e93d4f8cf590a8cf1c85cb1c316e13ff3
                                                                            • Instruction Fuzzy Hash: DE518171008304AFD7109F64DD48B6BBBF9FF48764F100A29F666962E1E7B5A804CF66
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00424499
                                                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004244D6
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000001), ref: 004244E7
                                                                            • CreateWindowExW.USER32(00000001,AutoIt v3,00000000,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0042452D
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetClientRect.USER32(00000000,?), ref: 00424539
                                                                            • CreateWindowExW.USER32(00000000,static,00000000,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 0042457B
                                                                            • GetStockObject.GDI32(00000011), ref: 00424594
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0042459C
                                                                            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004245AC
                                                                            • DeleteDC.GDI32(00000000), ref: 004245BF
                                                                            • CreateFontW.GDI32(000000FF,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004245EC
                                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00424603
                                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00424636
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00424649
                                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00424659
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00424687
                                                                            • GetStockObject.GDI32(00000011), ref: 00424692
                                                                            • SendMessageW.USER32(00000030,00000000), ref: 004246A1
                                                                            • ShowWindow.USER32(00000004), ref: 004246AB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateMessage$Send$ObjectRect$Stock$AdjustClientDeleteFaceFontInfoParametersSelectShowSystemText
                                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                            • API String ID: 3146017082-517079104
                                                                            • Opcode ID: 4811df5b26621ed0ce3bd37845cd523bdc11ccc9b80c2b88582800375c732b15
                                                                            • Instruction ID: 0ea4e11e3e79c58e147cb1b1b7bcc1d5b0af1ef9540a7792acd9cf9f67e6e92e
                                                                            • Opcode Fuzzy Hash: 4811df5b26621ed0ce3bd37845cd523bdc11ccc9b80c2b88582800375c732b15
                                                                            • Instruction Fuzzy Hash: 38919F72A00219BBDB219FB5DC4AFAF7B79EB85714F10412AF601E61D0D7789940CF68
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp$__wcsicmp
                                                                            • String ID: #ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                                                            • API String ID: 3245997131-3491316598
                                                                            • Opcode ID: 8c53a99e159a77eb3c8305982ffbf7191bf33cd9814f51bb302c6f18a69d0df4
                                                                            • Instruction ID: fd8ca7a7d6653f8ebf9a8b55ade8515512f25caea2e0b919a49b948067e8bbee
                                                                            • Opcode Fuzzy Hash: 8c53a99e159a77eb3c8305982ffbf7191bf33cd9814f51bb302c6f18a69d0df4
                                                                            • Instruction Fuzzy Hash: 9D512D31744206AFEB21AA11DC42F6A33A49F15314F10403BFD06BA2C2E77DED1596AF
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$LoadString__swprintf_printf$_wcscpy
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$==> %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 3489144772-3631278857
                                                                            • Opcode ID: 15d3e355fcf6c6fa2a9bd54a7ea35bc469e6ce0e7bacd291fb19b996094feb9d
                                                                            • Instruction ID: ccb4e0e673c022e8bc6463fd1aa55f329a3297598555cddc220932b96b526485
                                                                            • Opcode Fuzzy Hash: 15d3e355fcf6c6fa2a9bd54a7ea35bc469e6ce0e7bacd291fb19b996094feb9d
                                                                            • Instruction Fuzzy Hash: 8E4179B6D00118AADB51EB65CC85FEA777DBB44308F0440BBB648D2151EB789A888F5D
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000000,?,00000104,?,00407AEF,?,0000006A,?,0046C758,00000010,00000000), ref: 00406455
                                                                            • LoadStringW.USER32(00000000,?,00407AEF,?), ref: 0040645E
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000104,?,00000FFF,?,00407AEF,?,0000006A,?,0046C758,00000010,00000000,?,00406B57,00000001), ref: 0040646D
                                                                            • LoadStringW.USER32(00000000,?,00407AEF,?), ref: 00406470
                                                                            • __swprintf.LIBCMT ref: 004064A7
                                                                            • __swprintf.LIBCMT ref: 004064C1
                                                                            • _wcscat.LIBCMT ref: 004064D1
                                                                            • _wcscat.LIBCMT ref: 004064E3
                                                                            • _wcscpy.LIBCMT ref: 004064FA
                                                                            • _wcscat.LIBCMT ref: 00406514
                                                                            • _wcscat.LIBCMT ref: 00406527
                                                                            • _wcscat.LIBCMT ref: 00406534
                                                                            • _wcscat.LIBCMT ref: 00406548
                                                                            • _wcscat.LIBCMT ref: 0040655B
                                                                            • _printf.LIBCMT ref: 00406586
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004065A5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$HandleLoadModuleString__swprintf$Message_printf_wcscpy
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 1706439037-2268648507
                                                                            • Opcode ID: 9476ac9f024a31567de0fb207836f7cfb473fd0fdbb833066b313d042bfcf234
                                                                            • Instruction ID: 18808b91695d2313069144ea207e495185c92113326dd98d35dc705b474eb827
                                                                            • Opcode Fuzzy Hash: 9476ac9f024a31567de0fb207836f7cfb473fd0fdbb833066b313d042bfcf234
                                                                            • Instruction Fuzzy Hash: E54145B2C0411E7ADF10EBA1CC86EFA776CAF04354F0544B7F50992181EB7C9A54CB65
                                                                            APIs
                                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 0042476C
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00424777
                                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00424782
                                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 0042478D
                                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00424798
                                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 004247A3
                                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 004247AE
                                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 004247B9
                                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 004247C4
                                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 004247CF
                                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 004247DA
                                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 004247E5
                                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 004247F0
                                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 004247FB
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00424806
                                                                            • GetCursorPos.USER32(?), ref: 0042480F
                                                                            • WindowFromPoint.USER32(?,?), ref: 0042481B
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042482E
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00424837
                                                                            • AttachThreadInput.USER32(00000000), ref: 0042483A
                                                                            • GetCursor.USER32 ref: 00424840
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0042484E
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00424851
                                                                            • AttachThreadInput.USER32(00000000), ref: 00424854
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load$Thread$Window$AttachCurrentInputProcess$FromPoint
                                                                            • String ID:
                                                                            • API String ID: 25922675-0
                                                                            • Opcode ID: 02d165496c3eb0e64a5f070881b5cb90ef7cf5931ef0a421913aac2d4ab67e9e
                                                                            • Instruction ID: df3482417753693c6ce38815068ac3eafb7f32975cf613a9e94272d75589f2ef
                                                                            • Opcode Fuzzy Hash: 02d165496c3eb0e64a5f070881b5cb90ef7cf5931ef0a421913aac2d4ab67e9e
                                                                            • Instruction Fuzzy Hash: A5311070D083197ADF10ABF69C49CAFBEBCEF85B50B10056BF105E7190DAB8A401CE65
                                                                            APIs
                                                                              • Part of subcall function 004279C3: LoadLibraryA.KERNEL32(Wininet.dll,004225AF,?,00000000,?,?,?,?,?), ref: 004279CE
                                                                              • Part of subcall function 004279C3: GetProcAddress.KERNEL32(00000000,InternetConnectW), ref: 004279E0
                                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,?,?,?,?,?,00000000,00000000), ref: 004229A2
                                                                              • Part of subcall function 004187CB: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 0041881F
                                                                              • Part of subcall function 004187CB: LoadStringW.USER32(?,?,00000FFF), ref: 00418832
                                                                              • Part of subcall function 004187CB: __swprintf.LIBCMT ref: 0041886D
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188A0
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188AD
                                                                              • Part of subcall function 004187CB: _wcscpy.LIBCMT ref: 004188C3
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188E0
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 004188F3
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 00418900
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 00418914
                                                                              • Part of subcall function 004187CB: _wcscat.LIBCMT ref: 00418927
                                                                            • FreeLibrary.KERNEL32(?,0000008C,000000FF,00000000,00000000), ref: 00422949
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll), ref: 00422A3A
                                                                            • GetProcAddress.KERNEL32(00000000,HttpOpenRequestW), ref: 00422A49
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll), ref: 00422AA4
                                                                            • GetProcAddress.KERNEL32(00000000,HttpSendRequestW), ref: 00422AB3
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422B38
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422B42
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422BE3
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422BED
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C0E
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C18
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C41
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C4B
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C55
                                                                            • FreeLibrary.KERNEL32(?), ref: 00422C5F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$_wcscat$Load$AddressProc$String$__swprintf_wcscpy
                                                                            • String ID: $HttpOpenRequestW$HttpSendRequestW$Wininet.dll
                                                                            • API String ID: 1753536495-2827713860
                                                                            • Opcode ID: 045a0c82986c2d19534092c15b5db1876f5aeb385b4a8161e7d2b8201d415307
                                                                            • Instruction ID: 751a41108121307ecda0b9662a7b60f27b1cc92170ceb8a0375a6344560324e3
                                                                            • Opcode Fuzzy Hash: 045a0c82986c2d19534092c15b5db1876f5aeb385b4a8161e7d2b8201d415307
                                                                            • Instruction Fuzzy Hash: A1B15C71E00129BADF11AFA5ED859EEB779BF44304F90402AF510B3211CBB86E81DB69
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 0043A13C
                                                                            • GetDesktopWindow.USER32 ref: 0043A151
                                                                            • GetWindowRect.USER32(00000000), ref: 0043A15E
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0043A21C
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 0043A23A
                                                                            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 0043A261
                                                                            • SendMessageW.USER32(?,00000421,?,?), ref: 0043A276
                                                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0043A28B
                                                                            • IsWindowVisible.USER32(?), ref: 0043A293
                                                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 0043A2AE
                                                                            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0043A2C2
                                                                            • GetWindowRect.USER32(?,?), ref: 0043A2DD
                                                                            • CopyRect.USER32(?,?), ref: 0043A393
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 0043A3E0
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 0043A3ED
                                                                            • SendMessageW.USER32(?,00000412,00000000,00000010), ref: 0043A410
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Send$Window$Rect$FreeLibrary$CopyCreateCursorDesktopVisible
                                                                            • String ID: ($,$tooltips_class32
                                                                            • API String ID: 707417996-3320066284
                                                                            • Opcode ID: 2368569dffee9a7fe49dda09d731e8d3920df7213c47799bbca1dfd3ffa4b4ee
                                                                            • Instruction ID: dfa72f44a824a53eb9f7c4943b7ea511967b4a7f7db1d6f453af2dfa1755c6d4
                                                                            • Opcode Fuzzy Hash: 2368569dffee9a7fe49dda09d731e8d3920df7213c47799bbca1dfd3ffa4b4ee
                                                                            • Instruction Fuzzy Hash: DBC1A0715483009EEB10EF65C845B5FBBE4EF88708F10092EF985E62A1DB789949CF5B
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,00040000), ref: 0043BBD8
                                                                            • GetClientRect.USER32(?,00000000), ref: 0043BBE3
                                                                            • GetSystemMetrics.USER32(00000007), ref: 0043BBF1
                                                                            • GetSystemMetrics.USER32(00000008), ref: 0043BBFB
                                                                            • GetSystemMetrics.USER32(00000004), ref: 0043BC02
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,00040000,00000000), ref: 0043BC37
                                                                            • GetSystemMetrics.USER32(00000007), ref: 0043BC3F
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,00040000,00000000), ref: 0043BC67
                                                                            • GetSystemMetrics.USER32(00000008), ref: 0043BC6F
                                                                            • GetSystemMetrics.USER32(00000004), ref: 0043BC95
                                                                            • SetRect.USER32(00040000,00000000,00000000,?,00000000), ref: 0043BCB1
                                                                            • AdjustWindowRectEx.USER32(00040000,00040000,00000000,?), ref: 0043BCC2
                                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,00040000,?,00000000,00040000,00000000,?,00000000,00000000), ref: 0043BCF5
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0043BD17
                                                                            • SetClassLongW.USER32(00000000,000000F6,00000000), ref: 0043BD22
                                                                            • GetStockObject.GDI32(00000011), ref: 0043BD2B
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043BD36
                                                                            • SetTimer.USER32(00000000,00000002,00000028,00444A40), ref: 0043BE40
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: System$Metrics$Rect$Window$InfoParameters$AdjustBrushClassClientColorCreateLongMessageObjectSendStockTimer
                                                                            • String ID: AutoIt v3 GUI
                                                                            • API String ID: 1781331807-248962490
                                                                            • Opcode ID: ecb83d5b4f238292c0ab2f7b1202605a0c8645312d1f5b2e486c565de6485544
                                                                            • Instruction ID: a91afc32010e76df554ac7acab5fe93f962c83334b07bc691fbbb7f8590d8c6c
                                                                            • Opcode Fuzzy Hash: ecb83d5b4f238292c0ab2f7b1202605a0c8645312d1f5b2e486c565de6485544
                                                                            • Instruction Fuzzy Hash: 94C148B1900709DFDB20DF69C885ADBBBF4FB58304F10492EE7AA92250D778A950CF59
                                                                            APIs
                                                                            • _strcpy_s.LIBCMT ref: 0045524F
                                                                            • __invoke_watson.LIBCMT ref: 00455260
                                                                            • GetModuleFileNameA.KERNEL32(00000000,00478AA9,00000104), ref: 0045527C
                                                                            • _strcpy_s.LIBCMT ref: 00455291
                                                                            • __invoke_watson.LIBCMT ref: 004552A4
                                                                            • _strlen.LIBCMT ref: 004552AD
                                                                            • _strlen.LIBCMT ref: 004552BA
                                                                            • __invoke_watson.LIBCMT ref: 004552E7
                                                                            • _strcat_s.LIBCMT ref: 004552FA
                                                                            • __invoke_watson.LIBCMT ref: 0045530B
                                                                            • _strcat_s.LIBCMT ref: 0045531C
                                                                            • __invoke_watson.LIBCMT ref: 0045532D
                                                                            • GetStdHandle.KERNEL32(000000F4,?,?,00000000,76EC5E70,00000003,004553AF,000000FC,00450B11,00000001,00000000,00000000,?,00456F44,?,00000001), ref: 0045534C
                                                                            • _strlen.LIBCMT ref: 0045536D
                                                                            • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,00456F44,?,00000001,?,004554BC,00000018,00472858,0000000C,0045554B,?), ref: 00455377
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                            • API String ID: 1879448924-4022980321
                                                                            • Opcode ID: aa87b010eddb3fa176b5ab8e96c83ae5417a720fe101bd15f254419da4b61a71
                                                                            • Instruction ID: 1d82004233294e0a924edc4c587be4b3fb32911c013675b12b2cf0eec8b8e010
                                                                            • Opcode Fuzzy Hash: aa87b010eddb3fa176b5ab8e96c83ae5417a720fe101bd15f254419da4b61a71
                                                                            • Instruction Fuzzy Hash: 013129629407113AE62032759C5BF7F360D9B1139BF14012BFD0DA1693FA9D994886FF
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$LoadString__swprintf_printf
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$==> %s$Line %d (File "%s"):$Line %d:
                                                                            • API String ID: 3162818975-1269900534
                                                                            • Opcode ID: 47041d88fa9be1c24c53dd10df38261f204719b9419588098f5fa5b15ce4ad00
                                                                            • Instruction ID: 37da118907ff02b030625a89f57623f55f5ee40260ab4738ac99cc4e49722fe9
                                                                            • Opcode Fuzzy Hash: 47041d88fa9be1c24c53dd10df38261f204719b9419588098f5fa5b15ce4ad00
                                                                            • Instruction Fuzzy Hash: D341B7B6D04218BADF11EB61CC46FDA7B7CAF05304F0440BBB608A6151EA7D9A84CB59
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 00431257
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 00431263
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 0043126F
                                                                            • OpenProcess.KERNEL32(00000410,00000000,?), ref: 004312C0
                                                                              • Part of subcall function 0040DAA5: LoadLibraryA.KERNEL32(Psapi.dll,0040BE93,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DAB0
                                                                              • Part of subcall function 0040DAA5: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 0040DAC2
                                                                            • _wcscat.LIBCMT ref: 00431361
                                                                            • __wcsicmp.LIBCMT ref: 00431388
                                                                            • CloseHandle.KERNEL32(?), ref: 004313AF
                                                                            • FreeLibrary.KERNEL32(?), ref: 004313D9
                                                                            • FreeLibrary.KERNEL32(?), ref: 004313E5
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 00431417
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 00431423
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 0043142F
                                                                              • Part of subcall function 0040D9E9: LoadLibraryA.KERNEL32(kernel32.dll,0040BCD1,75920F00,0048BA08), ref: 0040D9F4
                                                                              • Part of subcall function 0040D9E9: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0040DA06
                                                                            • _wcscat.LIBCMT ref: 0043150D
                                                                            • __wcsicmp.LIBCMT ref: 00431534
                                                                            • CloseHandle.KERNEL32(00000000), ref: 00431586
                                                                            • FreeLibrary.KERNEL32(?), ref: 0043159E
                                                                            • FreeLibrary.KERNEL32(?), ref: 004315AA
                                                                            • FreeLibrary.KERNEL32(?), ref: 004315B6
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 00431694
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 004316A0
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 004316AC
                                                                              • Part of subcall function 0040DA18: LoadLibraryA.KERNEL32(kernel32.dll,0040BCE1,75920F00,0048BA08), ref: 0040DA23
                                                                              • Part of subcall function 0040DA18: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 0040DA35
                                                                              • Part of subcall function 0040DA47: LoadLibraryA.KERNEL32(kernel32.dll,0040BCF1,75920F00,0048BA08), ref: 0040DA52
                                                                              • Part of subcall function 0040DA47: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 0040DA64
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$AddressLoadProc$CloseHandle__wcsicmp_wcscat$OpenProcess
                                                                            • String ID:
                                                                            • API String ID: 3831895178-0
                                                                            • Opcode ID: dcbe2c8e1b939942e55c476014c7e0364b28b707ef0b7463df4401f07287a179
                                                                            • Instruction ID: 03cd494afa5a765d585dd5ef8c0b25e968e3e5ed9b9d9d2a4b12c3e33150d926
                                                                            • Opcode Fuzzy Hash: dcbe2c8e1b939942e55c476014c7e0364b28b707ef0b7463df4401f07287a179
                                                                            • Instruction Fuzzy Hash: 94E1A072908300ABDB11DF55C841A9FB7E4EFC8314F04192FF985A31A1DB79E949CB5A
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 0043903F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                            • API String ID: 3964851224-719923060
                                                                            • Opcode ID: 4e6766cc0e1f86fa91a8799184e7e7b3c8a0ceb20031f8465bbae226c62bfe6c
                                                                            • Instruction ID: 0f57f213e1708bb5bd0a3a5e3a29f3ccfea9ac9a17a1fe83503b9d738c2f31ca
                                                                            • Opcode Fuzzy Hash: 4e6766cc0e1f86fa91a8799184e7e7b3c8a0ceb20031f8465bbae226c62bfe6c
                                                                            • Instruction Fuzzy Hash: 4BC1C531508340AADA10EB769C5299FB794AF84718F144D2FF941771D2CABCAE0D8B9F
                                                                            APIs
                                                                            • __wcsicmp.LIBCMT ref: 004407C2
                                                                            • __wcsicmp.LIBCMT ref: 004407E3
                                                                            • __wcsicmp.LIBCMT ref: 00440804
                                                                              • Part of subcall function 0044E8B8: __wcsicmp_l.LIBCMT ref: 0044E93E
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00440834
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,?,?,00440762,?,?,?,?,?,0041F974,00000000,00000001), ref: 00440846
                                                                            • LoadImageW.USER32(?,00000000,00000001,?,?,00000000), ref: 0044087C
                                                                            • LoadImageW.USER32(?,00440762,00000001,?,?,00000000), ref: 0044089A
                                                                            • LoadImageW.USER32(00000000,00440762,00000001,?,?,00000000), ref: 004408B6
                                                                            • LoadImageW.USER32(?,00000000,00000001,?,?,00000000), ref: 004408DD
                                                                            • FreeLibrary.KERNEL32(?), ref: 004408EC
                                                                            • ExtractIconExW.SHELL32(?,00440762,00000000,?,00000001), ref: 00440931
                                                                            • DestroyCursor.USER32(?), ref: 0044093F
                                                                            • SendMessageW.USER32(?,00000170,?,00000000), ref: 0044095E
                                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0044096C
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?,00440762,?,?,?,?,?,0041F974), ref: 00440987
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Image$__wcsicmp$LibraryMessageSend$CursorDestroyExtractFreeIconMoveWindow__wcsicmp_l
                                                                            • String ID: .dll$.exe$.icl
                                                                            • API String ID: 2821903103-1154884017
                                                                            • Opcode ID: 7d48020d39262bea8e721651114f332967cc79a1594fdca158e3498eb661bc7a
                                                                            • Instruction ID: f23d337d68f157dae9fc308fb83934582488931c6bf3bbfdc20c18e53da4982e
                                                                            • Opcode Fuzzy Hash: 7d48020d39262bea8e721651114f332967cc79a1594fdca158e3498eb661bc7a
                                                                            • Instruction Fuzzy Hash: 3B6194B1804219BEFF10AFA4DC819BE7BBCFB08704F10406BFA01E6181D7799995CBA5
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$__wcsnicmp
                                                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                            • API String ID: 74746167-1810252412
                                                                            • Opcode ID: fcc990ed5dd8eae4cb7ffa56fd23780aa9e2265bfd48453e38632b54edf34e1e
                                                                            • Instruction ID: d97a053ce6c8fe7af3a1ff5c8caad3a4ae0f237680b571b49196cb039ded1fb4
                                                                            • Opcode Fuzzy Hash: fcc990ed5dd8eae4cb7ffa56fd23780aa9e2265bfd48453e38632b54edf34e1e
                                                                            • Instruction Fuzzy Hash: AE318971B44204B6EB10FAE7DC83E9E77AC9F01719B20443BF940B21C2F67DAA44865E
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00453D46), ref: 00454D99
                                                                            • __mtterm.LIBCMT ref: 00454DA5
                                                                              • Part of subcall function 00454A7E: TlsFree.KERNEL32(00000017,00454F12), ref: 00454AA9
                                                                              • Part of subcall function 00454A7E: RtlDeleteCriticalSection.NTDLL(00000000), ref: 00455420
                                                                              • Part of subcall function 00454A7E: RtlDeleteCriticalSection.NTDLL(00000017), ref: 0045544A
                                                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00454DBB
                                                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00454DC8
                                                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00454DD5
                                                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00454DE2
                                                                            • TlsAlloc.KERNEL32 ref: 00454E32
                                                                            • TlsSetValue.KERNEL32(00000000), ref: 00454E4D
                                                                            • __init_pointers.LIBCMT ref: 00454E57
                                                                            • __calloc_crt.LIBCMT ref: 00454ECC
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00454EFC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                                            • API String ID: 2125014093-3819984048
                                                                            • Opcode ID: a91f65bf8ae03dbad21a79275e2f26f6042d89102eac341d9598e3ba631a69d3
                                                                            • Instruction ID: 9d68b90e921f3db3b4a9f1b86605ec15c038b20e339c970240df50b602b87da7
                                                                            • Opcode Fuzzy Hash: a91f65bf8ae03dbad21a79275e2f26f6042d89102eac341d9598e3ba631a69d3
                                                                            • Instruction Fuzzy Hash: DD31A9724843119BD7216F75AC0D6063BA8AB8436E714053FFC1D9AAB2EF7884C4DB5D
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$D315__wcsicmp_wcscpy_wcsncpy
                                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                            • API String ID: 4078815740-1459072770
                                                                            • Opcode ID: 87c3c7b899783373cba4421efe3a5b675310fdc4e141698decda28053c332d86
                                                                            • Instruction ID: 3889e43d95ee9682a2cb71e3f36a495663fbd813d4dd37edec1d3fd37c37b6db
                                                                            • Opcode Fuzzy Hash: 87c3c7b899783373cba4421efe3a5b675310fdc4e141698decda28053c332d86
                                                                            • Instruction Fuzzy Hash: D041B272500204BAFB00AB669CC3DBF776CEF41324B14452FFD05A61C2EB3DAA01966D
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _strncmp$_strlen
                                                                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)
                                                                            • API String ID: 1402201865-501577721
                                                                            • Opcode ID: 16a32c2625ddbfff33df8d753e8f921b7cc07b9171a2e576bee7499a265dcd30
                                                                            • Instruction ID: 5d6a6b1c2e7de474ffc98797f4a540a4a617867c62fe29d48610db23a7de32cc
                                                                            • Opcode Fuzzy Hash: 16a32c2625ddbfff33df8d753e8f921b7cc07b9171a2e576bee7499a265dcd30
                                                                            • Instruction Fuzzy Hash: 57129CB1D00209ABEB21CF98C884BEEBBF4AF14304F24415FE855E7281E7789E45DB59
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\regsvr.exe,00000104,?,00000104), ref: 0040143E
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • __wcsicmp.LIBCMT ref: 00401546
                                                                            • __wcsicmp.LIBCMT ref: 0040156F
                                                                            • __wcsicmp.LIBCMT ref: 00401598
                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\regsvr.exe,00000104,?,?,?,00000000,?,?,00000100,CMDLINE,00000000,00000000,?,?,00000001), ref: 004015BA
                                                                              • Part of subcall function 0040E27C: MessageBoxA.USER32(00000000,AStack: top(): Out of bounds.,Fatal Error,00000010), ref: 0040E28F
                                                                            • __wcsicmp.LIBCMT ref: 004015F4
                                                                            • _wcscpy.LIBCMT ref: 00401615
                                                                            • _wcscpy.LIBCMT ref: 0040163A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$FileModuleName_wcscpy$Message_malloc
                                                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\regsvr.exe$CMDLINE$CMDLINERAW
                                                                            • API String ID: 2926296014-1559103961
                                                                            • Opcode ID: 56d8d6a0d69f4c8fcfad1f0d5d44e947697b4a62802a192e1416724999e6818a
                                                                            • Instruction ID: 8baaea8769b03da17686fea3c2718552191f02dec867cb6267ff56e3343e8ccc
                                                                            • Opcode Fuzzy Hash: 56d8d6a0d69f4c8fcfad1f0d5d44e947697b4a62802a192e1416724999e6818a
                                                                            • Instruction Fuzzy Hash: 10817172D40209AEDF11FBA6DC429DEBB78EF44318F10443BF600B61E2DB7995858B99
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000100,?,00406F25,?,?,?,Unterminated string,?), ref: 00406356
                                                                            • LoadStringW.USER32(00000000,?,00406F25,?), ref: 0040635D
                                                                            • _printf.LIBCMT ref: 00406382
                                                                            • __swprintf.LIBCMT ref: 004063A4
                                                                            • _wcscat.LIBCMT ref: 004063CC
                                                                            • _wcscat.LIBCMT ref: 004063DD
                                                                            • _wcscat.LIBCMT ref: 004063EC
                                                                            • _wcscat.LIBCMT ref: 004063FD
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0040641A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$HandleLoadMessageModuleString__swprintf_printf
                                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                            • API String ID: 2694856617-4153970271
                                                                            • Opcode ID: e17a6d26f222d3779a490a25de55361a281bafd17fa1d6a413b55399a5a50f9d
                                                                            • Instruction ID: e151ed4fb6ffda387a16dc85b2441e9dce5ada2fe4fbde2f1c543733043571ba
                                                                            • Opcode Fuzzy Hash: e17a6d26f222d3779a490a25de55361a281bafd17fa1d6a413b55399a5a50f9d
                                                                            • Instruction Fuzzy Hash: CB21997190020EBBDF11FFD1CC4BFDA3768AB04304F048497FA14A1192E6B99664DB6A
                                                                            APIs
                                                                            • LoadIconW.USER32(000000A1), ref: 00404EFD
                                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00404F0F
                                                                            • SetWindowTextW.USER32(?,?), ref: 00404F20
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00404F39
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00404F3F
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00404F54
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00404F5A
                                                                            • SendDlgItemMessageW.USER32(000003E9,000003E9,000000CC,?,00000000), ref: 00404F7E
                                                                            • SendDlgItemMessageW.USER32(000003E9,000003E9,000000C5,?,00000000), ref: 00404F93
                                                                            • GetWindowRect.USER32(?,?), ref: 00404F9C
                                                                            • SetWindowTextW.USER32(?,?), ref: 0040502C
                                                                            • GetDesktopWindow.USER32 ref: 00405036
                                                                            • GetWindowRect.USER32(00000000), ref: 0040503D
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00405089
                                                                            • GetClientRect.USER32(?,?), ref: 00405096
                                                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 004050BB
                                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 004050E6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                            • String ID:
                                                                            • API String ID: 3869813825-0
                                                                            • Opcode ID: 45e913b3e83ba03e4089e82c3362d87de76d298c38a88d8c2b64e9d937621f74
                                                                            • Instruction ID: 4e8b0a2e980f2a70a03bb40557044616ecd6405306d1f05948111485336c3ef2
                                                                            • Opcode Fuzzy Hash: 45e913b3e83ba03e4089e82c3362d87de76d298c38a88d8c2b64e9d937621f74
                                                                            • Instruction Fuzzy Hash: DE615A71A0061ABFDB109FA9DC48B9EBBB8FB08345F004166F605F25A0D775B961CF94
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 0043951A
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00439585
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharMessageSendUpper
                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                            • API String ID: 3974292440-4258414348
                                                                            • Opcode ID: 02a3fad684b6108baf82588eb52a400f963381795ba7a4c90274b67bf3a4085f
                                                                            • Instruction ID: c2b1a124e3249057a2f65bede07fb55ca5e135e7cc4637c685c7e7daefab9227
                                                                            • Opcode Fuzzy Hash: 02a3fad684b6108baf82588eb52a400f963381795ba7a4c90274b67bf3a4085f
                                                                            • Instruction Fuzzy Hash: E6B1C5316083406ADA10BB369856B5EB7D5AF84718F044C3FF981B72D2DABC9E09875F
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 00460695
                                                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004606B1
                                                                              • Part of subcall function 0045492A: TlsGetValue.KERNEL32(00000000,0045499F,00000000,00460676,00000000,00000000,00000314,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 00454937
                                                                              • Part of subcall function 0045492A: TlsGetValue.KERNEL32(00000006,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 0045494E
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004606CE
                                                                              • Part of subcall function 0045492A: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 00454963
                                                                              • Part of subcall function 0045492A: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0045497E
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004606E3
                                                                            • __invoke_watson.LIBCMT ref: 00460704
                                                                              • Part of subcall function 00454F21: _memset.LIBCMT ref: 00454FAD
                                                                              • Part of subcall function 00454F21: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 00454FD5
                                                                              • Part of subcall function 00454F21: UnhandledExceptionFilter.KERNEL32(00478A90,?,?,00000000), ref: 00454FDF
                                                                              • Part of subcall function 00454F21: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 00454FFA
                                                                              • Part of subcall function 00454F21: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 00455001
                                                                              • Part of subcall function 004549A1: TlsGetValue.KERNEL32(00000000,00454A51,?,0045321E), ref: 004549AE
                                                                              • Part of subcall function 004549A1: TlsGetValue.KERNEL32(00000006,?,0045321E), ref: 004549C5
                                                                              • Part of subcall function 004549A1: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,0045321E), ref: 004549DA
                                                                              • Part of subcall function 004549A1: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 004549F5
                                                                            • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 00460718
                                                                            • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 00460730
                                                                            • __invoke_watson.LIBCMT ref: 004607A3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentLibraryLoadTerminate_memset
                                                                            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                            • API String ID: 3396755237-232180764
                                                                            • Opcode ID: 57a44964ac64d5b11d8b1c4044489f767c09f84903454ab62b6a2c21a82893ad
                                                                            • Instruction ID: 317ab2de07a184bf9ed46fd5c37fab9b7c3e79e5134d6e8e902db75470fe0d6b
                                                                            • Opcode Fuzzy Hash: 57a44964ac64d5b11d8b1c4044489f767c09f84903454ab62b6a2c21a82893ad
                                                                            • Instruction Fuzzy Hash: 8D4177B1904209BADF14BFB59D8695F7BA8EF4431AF10087FE404D6152FB3899C48A5F
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp
                                                                            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                                                            • API String ID: 1389419275-4202584635
                                                                            • Opcode ID: dc929546045c7104619eacdf44a17ef7b863ab2511e8f23ede725b48b707e6c7
                                                                            • Instruction ID: 8057e5b7c29695faab4cceaa99c9a4802369ae5119d862717dd59953e0cbe8e0
                                                                            • Opcode Fuzzy Hash: dc929546045c7104619eacdf44a17ef7b863ab2511e8f23ede725b48b707e6c7
                                                                            • Instruction Fuzzy Hash: EB0148626DA70038FE2972B6AC13BAB02989B51B3BF30012FF940E50C5FF5E9605504E
                                                                            APIs
                                                                              • Part of subcall function 0040FB8E: VariantClear.OLEAUT32(?), ref: 0040FBA8
                                                                            • VariantCopy.OLEAUT32(00000000,0042983F), ref: 0041037E
                                                                            • VariantClear.OLEAUT32(00000000), ref: 0041038E
                                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 004103FC
                                                                            • __swprintf.LIBCMT ref: 00410429
                                                                            • VarR4FromDec.OLEAUT32(?,0042983F), ref: 00410448
                                                                            • VariantInit.OLEAUT32(00000000), ref: 0041064C
                                                                            • VariantCopy.OLEAUT32(00000000,0042983F), ref: 00410655
                                                                            • VariantClear.OLEAUT32(00000000), ref: 00410665
                                                                            • SafeArrayAccessData.OLEAUT32(C1EC4D8B,00000000), ref: 0041067F
                                                                            • SafeArrayAccessData.OLEAUT32(C1EC4D8B,?), ref: 004106F9
                                                                            • SafeArrayAccessData.OLEAUT32(C1EC4D8B,?), ref: 00410766
                                                                            • SafeArrayUnaccessData.OLEAUT32(C1EC4D8B), ref: 004107C7
                                                                            Strings
                                                                            • %4d%02d%02d%02d%02d%02d, xrefs: 00410423
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ArrayDataSafe$AccessClear$CopyTime$FromInitSystemUnaccess__swprintf
                                                                            • String ID: %4d%02d%02d%02d%02d%02d
                                                                            • API String ID: 32631658-1568723262
                                                                            • Opcode ID: 2b8bc5bbc800b56403a2da82b8ccf884d14755505377944e4c038d112345b3fa
                                                                            • Instruction ID: 0a53b11e712b3718507fe26e3e3bd42dc4545f3d970e85883008e37ac446a216
                                                                            • Opcode Fuzzy Hash: 2b8bc5bbc800b56403a2da82b8ccf884d14755505377944e4c038d112345b3fa
                                                                            • Instruction Fuzzy Hash: CBE19B70600211EFDB10DF6AC484BAAB7B5BF05704F1484AAE856DB2A1D7B8ECC1DF59
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CharLowerBuffW.USER32(?,?), ref: 0041C73F
                                                                            • GetDriveTypeW.KERNEL32(?,open,close), ref: 0041C7BE
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0041C82A
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0041C858
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0041C87A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$BuffCharDriveLowerMessageType
                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                            • API String ID: 2211858068-4113822522
                                                                            • Opcode ID: e759f7d6bbdbb16698bfb4315c44b07ade8e0f1fa8f4f0f04223affbd9afef47
                                                                            • Instruction ID: 6c5257b6ec700783efadaf7baaaee008c686eabfce340e565260301087c3ce98
                                                                            • Opcode Fuzzy Hash: e759f7d6bbdbb16698bfb4315c44b07ade8e0f1fa8f4f0f04223affbd9afef47
                                                                            • Instruction Fuzzy Hash: C041D472900259AADF01BBB2DC919EE7B75EF40758B10883BF810771D2EB7C9E458B58
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0043E59D
                                                                            • DeleteObject.GDI32(?), ref: 0043EA1A
                                                                            • DeleteObject.GDI32(?), ref: 0043EA24
                                                                            • DestroyCursor.USER32(?), ref: 0043EA2E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: DeleteObject$CursorDestroyMessageSend
                                                                            • String ID:
                                                                            • API String ID: 2743624342-0
                                                                            • Opcode ID: 4ecfba3a1a4699e3378cf87a9f81c863a6aea31db3fb579d2d41a6e2682bebb6
                                                                            • Instruction ID: f7229816c0aaf798ac1b5cfac2ee67e9f65f11b14df41f1edbf78cc30dc7d1e9
                                                                            • Opcode Fuzzy Hash: 4ecfba3a1a4699e3378cf87a9f81c863a6aea31db3fb579d2d41a6e2682bebb6
                                                                            • Instruction Fuzzy Hash: 49F1BC70205741AFDB20EF26C888B67B7E0BF18314F14195AE5A2C76E1D338E885CB5A
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000143,000000FF), ref: 0043DDA1
                                                                            • SendMessageW.USER32(0000014B,0000014B,00000000,00000000), ref: 0043DDB3
                                                                            • CharNextW.USER32(?,?,00000143,000000FF,?,0041FDAC), ref: 0043DDE6
                                                                            • SendMessageW.USER32(0000014B,0041FDAC,00000000,00000000), ref: 0043DDFC
                                                                            • SendMessageW.USER32(0000014B,?,00000000,?), ref: 0043DE17
                                                                            • SendMessageW.USER32(0000014B,00000143,000000FF,00000000), ref: 0043DE46
                                                                            • SendMessageW.USER32(0000014B,0000014B,00000000,00000000), ref: 0043DE5C
                                                                            • SendMessageW.USER32(?,000000C2,00000001), ref: 0043DE7B
                                                                            • SendMessageW.USER32(0000014B,00001002,00000000,?), ref: 0043DF14
                                                                            • SendMessageW.USER32 ref: 0043E16D
                                                                            • InvalidateRect.USER32(0041FDAC,00000000,00000001), ref: 0043E18B
                                                                            • SetWindowTextW.USER32 ref: 0043E241
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CharInvalidateNextRectTextWindow
                                                                            • String ID:
                                                                            • API String ID: 2270220186-0
                                                                            • Opcode ID: d756a9f7446d9df098ef97ead8a5f0e769d94820e650de9758e42f09c51ce64b
                                                                            • Instruction ID: 71575e49528c5db37b8b99981aa3aa767182ade2916124aeefa16e3c595376f1
                                                                            • Opcode Fuzzy Hash: d756a9f7446d9df098ef97ead8a5f0e769d94820e650de9758e42f09c51ce64b
                                                                            • Instruction Fuzzy Hash: C171E371508300AFE7208F11DC44B6BBBE9BF4D718F101A6FF595A62E0C7B89905DB5A
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0041BFE0
                                                                            • _memset.LIBCMT ref: 0041BFF9
                                                                            • CoInitialize.OLE32(00000000), ref: 0041C009
                                                                            • SHGetMalloc.SHELL32(?), ref: 0041C016
                                                                            • SHGetDesktopFolder.SHELL32(?), ref: 0041C086
                                                                            • _wcscpy.LIBCMT ref: 0041C0AA
                                                                            • _wcscpy.LIBCMT ref: 0041C107
                                                                            • _wcscpy.LIBCMT ref: 0041C13C
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0041C159
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0041C17C
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CoUninitialize.COMBASE ref: 0041C1C8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$Folder_memset$BrowseDesktopFromInitializeListMallocMessagePathUninitialize
                                                                            • String ID: @
                                                                            • API String ID: 2954865823-2766056989
                                                                            • Opcode ID: cb5d83b83f134cffb1941c8b7e24cbf8fff3535e222c16a22082972738369067
                                                                            • Instruction ID: aced68c843bad2faca577efe092138eb3eddef4f07f4e4d3922cff580fb51100
                                                                            • Opcode Fuzzy Hash: cb5d83b83f134cffb1941c8b7e24cbf8fff3535e222c16a22082972738369067
                                                                            • Instruction Fuzzy Hash: BC517071900218AFCB10EFA5CC899DEB7B9EF48309F14456BF505E7241DB789E848F59
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00407F39
                                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00407F43
                                                                            • MapVirtualKeyW.USER32(00000000), ref: 00407F51
                                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00407F5E
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00407F68
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00407F72
                                                                            • GetKeyboardLayoutNameA.USER32(?), ref: 00407F7D
                                                                            • VkKeyScanA.USER32(00000000), ref: 00407F90
                                                                            • _strncmp.LIBCMT ref: 00407FC7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$KeyboardLayoutNameScan_strncmp
                                                                            • String ID: 0002$0409$0809
                                                                            • API String ID: 1585530699-2507973371
                                                                            • Opcode ID: 17e7217e618673f7fb0b3ab063125f77c822ad39de37a88e90bdc1c421a54322
                                                                            • Instruction ID: f4589159273ea8524884ce451454c2b01fd318127f3562d9e445f7b5cc0eee43
                                                                            • Opcode Fuzzy Hash: 17e7217e618673f7fb0b3ab063125f77c822ad39de37a88e90bdc1c421a54322
                                                                            • Instruction Fuzzy Hash: 9441B071A48384ADE704DBB9AC4AB5A3FD8DB11308F14047FE581D61D2EF78A54887AE
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,00000001,?), ref: 004405A1
                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 004405B7
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004405C3
                                                                            • GlobalLock.KERNEL32(00000000), ref: 004405CC
                                                                            • ReadFile.KERNEL32(00000000,00000000,000000FF,000000FF,00000000), ref: 004405DC
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 004405E3
                                                                            • CloseHandle.KERNEL32(00000000), ref: 004405EA
                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,000000FF), ref: 004405F7
                                                                            • OleLoadPicture.OLEAUT32(000000FF,00000000,00000000,00467900,?), ref: 0044060B
                                                                            • GlobalFree.KERNEL32(00000000), ref: 0044061B
                                                                            • GetObjectW.GDI32(00000001,00000018,?), ref: 0044063B
                                                                            • CopyImage.USER32(00000001,00000000,?,000000FF,00002000), ref: 00440672
                                                                            • DeleteObject.GDI32(?), ref: 00440694
                                                                            • SendMessageW.USER32(?,00000172,00000000,00000001), ref: 004406AA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                            • String ID:
                                                                            • API String ID: 3969911579-0
                                                                            • Opcode ID: f9fcca3677ac8062e0a3a9c3a3efe7e56e376da3ff41eaada435d9752107cbd5
                                                                            • Instruction ID: 24f7dc57787f5485d8d61bd88917a9ff937e9a3def8c4dea298511fa8aa15da6
                                                                            • Opcode Fuzzy Hash: f9fcca3677ac8062e0a3a9c3a3efe7e56e376da3ff41eaada435d9752107cbd5
                                                                            • Instruction Fuzzy Hash: EE416A71900214BFDB119FA0DC88DAFBB79FF8A714B108066F902E7260D7749951CFA5
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat_wcscpy$_wcschr
                                                                            • String ID: .$.
                                                                            • API String ID: 1766671649-3769392785
                                                                            • Opcode ID: 914dbbaa8903bc26c1409dc351f811b41fe4a5462a63659048ee304ecceaf96c
                                                                            • Instruction ID: 95beb12b571e07c4b3fcb6b14ebd9bb743c313e059d296a0428f21cf889bbef3
                                                                            • Opcode Fuzzy Hash: 914dbbaa8903bc26c1409dc351f811b41fe4a5462a63659048ee304ecceaf96c
                                                                            • Instruction Fuzzy Hash: A341E5B280411DA9DF61EB51DC46EDE73BCAB04314F1041EBB505A2081EA79ABD98FA9
                                                                            APIs
                                                                            • GetParent.USER32 ref: 004027E0
                                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 004027F5
                                                                            • __wcsicmp.LIBCMT ref: 0040281A
                                                                            • __wcsicmp.LIBCMT ref: 00402835
                                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00402882
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$ClassMessageNameParentSend
                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                            • API String ID: 7836182-3381328864
                                                                            • Opcode ID: 5dd6843d1f2ede7808f8b6080265d7f1f438d0aa80e9f475d01216b713322e71
                                                                            • Instruction ID: b08ab6248bc50ce0ad3101dcc044c7495cd534409aacc10e854c5019f6e43ea9
                                                                            • Opcode Fuzzy Hash: 5dd6843d1f2ede7808f8b6080265d7f1f438d0aa80e9f475d01216b713322e71
                                                                            • Instruction Fuzzy Hash: FC116D76648305BEFA1476A25D0AE77279CDB04729B20416BFD01E31D1FAECE842496E
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$IconLoad
                                                                            • String ID: blank$info$question$stop$warning
                                                                            • API String ID: 4260361741-404129466
                                                                            • Opcode ID: 1823751d4d475c1db501a0717702528feca2c90563e5bb3170018dffad61b1c0
                                                                            • Instruction ID: ba6e58bbbbbd64570c897e67d9d3b1defe15f80a5f334dec41f9fb007f32b1fd
                                                                            • Opcode Fuzzy Hash: 1823751d4d475c1db501a0717702528feca2c90563e5bb3170018dffad61b1c0
                                                                            • Instruction Fuzzy Hash: 0A11333128D305BDFA05B762AC07D6B2298EF11725B20007FF841F22C1FA7EAA11555F
                                                                            APIs
                                                                              • Part of subcall function 0040DA76: LoadLibraryA.KERNEL32(Psapi.dll,0040BE7D,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DA81
                                                                              • Part of subcall function 0040DA76: GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 0040DA93
                                                                            • FreeLibrary.KERNEL32(0041902D,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C06E
                                                                              • Part of subcall function 0040DAA5: LoadLibraryA.KERNEL32(Psapi.dll,0040BE93,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DAB0
                                                                              • Part of subcall function 0040DAA5: GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 0040DAC2
                                                                            • FreeLibrary.KERNEL32(?,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C064
                                                                              • Part of subcall function 0040DAD4: LoadLibraryA.KERNEL32(Psapi.dll,0040BEA3,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DADF
                                                                              • Part of subcall function 0040DAD4: GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040DAF1
                                                                            • FreeLibrary.KERNEL32(00000001,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040BEE3
                                                                            • FreeLibrary.KERNEL32(?,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040BEED
                                                                            • FreeLibrary.KERNEL32(0041902D,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040BEFB
                                                                              • Part of subcall function 0044EF6F: _strtol.LIBCMT ref: 0044EF77
                                                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040BF43
                                                                            • _wcscat.LIBCMT ref: 0040BFD1
                                                                            • __wcsicmp.LIBCMT ref: 0040BFE0
                                                                            • CloseHandle.KERNEL32(?,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C016
                                                                            • FreeLibrary.KERNEL32(00000001,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C038
                                                                            • FreeLibrary.KERNEL32(?,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C042
                                                                            • FreeLibrary.KERNEL32(0041902D,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C04C
                                                                            • FreeLibrary.KERNEL32(00000001,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040C05A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$AddressLoadProc$CloseHandleOpenProcess__wcsicmp_strtol_wcscat
                                                                            • String ID:
                                                                            • API String ID: 2602667755-0
                                                                            • Opcode ID: d61cc667b7835ab6853b59277e496039c8afb2d1f9b4de2794f86d782953e0f8
                                                                            • Instruction ID: 56ebe760d5a469f108e129d8574b549897e0d44da98d1eee39eabc2c6de3ef73
                                                                            • Opcode Fuzzy Hash: d61cc667b7835ab6853b59277e496039c8afb2d1f9b4de2794f86d782953e0f8
                                                                            • Instruction Fuzzy Hash: D461C472D00219EBCF11EFE5CC81ADEB7B5AB08304F10417AE901B22A1D7796A45DFA9
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,?,?,00000000), ref: 00433FAD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                            • API String ID: 3964851224-909552448
                                                                            • Opcode ID: f0801aa1abd3ef248cdae24e7f96a4dda09766534d84e6bb2618a3cbe49b14ee
                                                                            • Instruction ID: e4456d1138c056a5321253eefd50be2e5c89f66ccb633fcf386c145300cb8eb7
                                                                            • Opcode Fuzzy Hash: f0801aa1abd3ef248cdae24e7f96a4dda09766534d84e6bb2618a3cbe49b14ee
                                                                            • Instruction Fuzzy Hash: A29108315003459EEF01AF6AEC567DE3B60EF41368F04885AFD50372E2D77C6A95C698
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(0048C258,000000FF,00000000,0000002C), ref: 00409DBF
                                                                            • SetMenuItemInfoW.USER32(0048C258,00000004,00000000,0000002C), ref: 00409DF5
                                                                            • Sleep.KERNEL32(000001F4,0048C258), ref: 00409E06
                                                                            • GetMenuItemCount.USER32(?), ref: 00409E4D
                                                                            • GetMenuItemID.USER32(?,00000000), ref: 00409E6E
                                                                            • GetMenuItemID.USER32(?,-00000001), ref: 00409E93
                                                                            • GetMenuItemID.USER32(?,?), ref: 00409EC8
                                                                            • CheckMenuRadioItem.USER32(?,?,?,?,00000400), ref: 00409F03
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,0000002C), ref: 00409F1C
                                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,0000002C), ref: 00409F3B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                            • String ID: ,
                                                                            • API String ID: 1460738036-3772416878
                                                                            • Opcode ID: d54fbac617ba3394bef3d630c9ff5494c340c2e62df62154e220661a047cd606
                                                                            • Instruction ID: 2a22892b49afed48f81b27d93027d98337d9210b4c28f2d31f6b5bdafcdd1208
                                                                            • Opcode Fuzzy Hash: d54fbac617ba3394bef3d630c9ff5494c340c2e62df62154e220661a047cd606
                                                                            • Instruction Fuzzy Hash: D051BE70904209AEDF11DFA4C884AEEBBB9EF01308F20807BE541B72D2D7785E85CB59
                                                                            APIs
                                                                            • StringFromIID.COMBASE(?,?), ref: 004280E5
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • CoTaskMemFree.COMBASE(?), ref: 00428130
                                                                            • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?), ref: 00428148
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00428176
                                                                            • CLSIDFromString.COMBASE(00000000,?), ref: 004281A5
                                                                            • RegQueryValueExW.ADVAPI32(?,Version,00000000,00000000,?,00000001), ref: 004281DA
                                                                            • LoadRegTypeLib.OLEAUT32(?,00000000,00000000), ref: 0042822D
                                                                              • Part of subcall function 00451654: __wtof_l.LIBCMT ref: 0045165A
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00428256
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FromQueryStringValue$CloseFreeLoadOpenTaskType__wtof_l_wcscpy
                                                                            • String ID: Version$\TypeLib$interface\
                                                                            • API String ID: 943498556-939221531
                                                                            • Opcode ID: a1d15348556cf66bcdc0cb42cdcb2bfbb7b03f165823dbf8b20fbb5a6350ee48
                                                                            • Instruction ID: 3d3e318f2cb5111273247ffab3a4b5002f674caa10f5f47532352b726c1dabe7
                                                                            • Opcode Fuzzy Hash: a1d15348556cf66bcdc0cb42cdcb2bfbb7b03f165823dbf8b20fbb5a6350ee48
                                                                            • Instruction Fuzzy Hash: 7C413B72C00118EBCF11EBE5DC888DEBBB8FF48354F1045AAF915B3251EA399A54CB65
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 004282FF
                                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00428333
                                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0042834E
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0042836E
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00428398
                                                                            • CLSIDFromString.COMBASE(00000000,?), ref: 004283C5
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004283D7
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004283DC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                            • API String ID: 1687751970-22481851
                                                                            • Opcode ID: 5c6d2722f241780e415c12530e078d4e73ec7a9b24fdaa5f2637a44f9cb54fb9
                                                                            • Instruction ID: 9cb335a863502e44f73f4fc5ddb5ee815b9b4a4335ba87f11416018ffe3a9f35
                                                                            • Opcode Fuzzy Hash: 5c6d2722f241780e415c12530e078d4e73ec7a9b24fdaa5f2637a44f9cb54fb9
                                                                            • Instruction Fuzzy Hash: 82417031D01118ABCB10EFA2DC45CDEBBB8FF44754F50446AF500B21A1EB799E548B98
                                                                            APIs
                                                                            • RegOpenKeyExW.ADVAPI32(80000000,interface,00000000,00020019,?), ref: 00427FCB
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,00000028,00000000,00000000,00000000,?), ref: 00427FFD
                                                                            • RegOpenKeyExW.ADVAPI32(80000000,?,00000000,00020019,?,00000000,interface\), ref: 0042803F
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,000001FE), ref: 00428058
                                                                            • __wcsicmp.LIBCMT ref: 0042807B
                                                                            • IIDFromString.COMBASE(00000000,00000000), ref: 0042808D
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00428099
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004280B7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpen$EnumFromQueryStringValue__wcsicmp
                                                                            • String ID: ($interface$interface\
                                                                            • API String ID: 2232923661-3327702407
                                                                            • Opcode ID: e5d7d0b0675df7653fdcdeb56f1c2e35951249a3fe2d299e4e5d27ad850f7547
                                                                            • Instruction ID: 3243c2b5daf0432cb4a17ffbf76eea3d2d028ecfb0acc963761d9c74434f0f59
                                                                            • Opcode Fuzzy Hash: e5d7d0b0675df7653fdcdeb56f1c2e35951249a3fe2d299e4e5d27ad850f7547
                                                                            • Instruction Fuzzy Hash: 7931097290521DEBEF10DBA1DD45EEEB7BCFB04348F20406AE900F2191E7789A049F69
                                                                            APIs
                                                                            • timeGetTime.WINMM ref: 0040C108
                                                                            • timeGetTime.WINMM ref: 0040C11E
                                                                            • Sleep.KERNEL32(0000000A), ref: 0040C132
                                                                            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 0040C176
                                                                            • SetActiveWindow.USER32 ref: 0040C197
                                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0040C1A5
                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040C1C5
                                                                            • Sleep.KERNEL32(000000FA), ref: 0040C1D0
                                                                            • IsWindow.USER32 ref: 0040C1DC
                                                                            • EndDialog.USER32(00000000), ref: 0040C1ED
                                                                              • Part of subcall function 0040D375: GetWindowThreadProcessId.USER32(?,00000000), ref: 0040D396
                                                                              • Part of subcall function 0040D375: GetCurrentThreadId.KERNEL32 ref: 0040D39D
                                                                              • Part of subcall function 0040D375: AttachThreadInput.USER32(00000000), ref: 0040D3A4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Thread$MessageSendSleepTimetime$ActiveAttachCurrentDialogFindInputProcess
                                                                            • String ID: BUTTON
                                                                            • API String ID: 2994871518-3405671355
                                                                            • Opcode ID: 7feae41d173d9c25965804a5a81675744189c9a03c11f2e4549ececfeb94c251
                                                                            • Instruction ID: f7b49b4b1143b5e56d5be54055dc5d07e824ba47b1f3b776ffa78f7e280b4b15
                                                                            • Opcode Fuzzy Hash: 7feae41d173d9c25965804a5a81675744189c9a03c11f2e4549ececfeb94c251
                                                                            • Instruction Fuzzy Hash: C32192B1108605FFDB111B60FCC8E6E3B68E704359B14467AF502B51F2EAB94C42AF6E
                                                                            APIs
                                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0040D234
                                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0040D248
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0040D258
                                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0040D26B
                                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0040D278
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: SendString
                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                            • API String ID: 890592661-1007645807
                                                                            • Opcode ID: 13f698b10254c1e619dc330319388c8105513ecc05685312b349ab564dbbfa46
                                                                            • Instruction ID: 21f41cf1200f56aec09ca5427a3cf159b1276f970a239394b68112021b7638be
                                                                            • Opcode Fuzzy Hash: 13f698b10254c1e619dc330319388c8105513ecc05685312b349ab564dbbfa46
                                                                            • Instruction Fuzzy Hash: 4D1151B1D4011C7AEB10AAA2DCC5DBE7B6CDB4079CF5045BBB01472091E7B89E448AA9
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00427D1F
                                                                            • SysAllocString.OLEAUT32(?), ref: 00427DAB
                                                                            • CoTaskMemFree.COMBASE(?), ref: 00427DB7
                                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,00000000), ref: 00427DD6
                                                                            • SafeArrayAllocData.OLEAUT32(00000000), ref: 00427E27
                                                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00427E3C
                                                                            • VariantInit.OLEAUT32(?), ref: 00427E6D
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00427E97
                                                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00427EB4
                                                                            • SafeArrayDestroyData.OLEAUT32(00000000), ref: 00427EC6
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(00000000), ref: 00427ED5
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00427EFC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$DataVariant$Alloc$CopyDescriptorDestroyInit$AccessFreeStringTaskUnaccess
                                                                            • String ID:
                                                                            • API String ID: 2357396938-0
                                                                            • Opcode ID: b95c6e65530efb454013ee0b7425e765706e9a57df5be9b58ef508cc060b3a7d
                                                                            • Instruction ID: 6f5537f683651e9b32ff6c4263a33c438a228174f3afa289b84319554c349ee5
                                                                            • Opcode Fuzzy Hash: b95c6e65530efb454013ee0b7425e765706e9a57df5be9b58ef508cc060b3a7d
                                                                            • Instruction Fuzzy Hash: 2B71A931718226DFCB10DF95E8859AEB7B4FF04314BA144AEE805E7310E7789D41DBA9
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000001), ref: 0040510B
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00405123
                                                                            • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00405181
                                                                            • GetDlgItem.USER32(?,00000002), ref: 00405190
                                                                            • GetWindowRect.USER32(00000000,?), ref: 004051A2
                                                                            • MoveWindow.USER32(?,?,00000000,?,?,00000000), ref: 004051F6
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405203
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00405215
                                                                            • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00405255
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00405262
                                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0040527B
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00405287
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                            • String ID:
                                                                            • API String ID: 3096461208-0
                                                                            • Opcode ID: 98b34d1d321fcfa138617dd29b0f5ad7f0d2af4a82214095a1b38b72c1e11ed3
                                                                            • Instruction ID: df784a5c501df33d32623606d2407a73d2ef5cd1658e1004e46ce22e34e15a81
                                                                            • Opcode Fuzzy Hash: 98b34d1d321fcfa138617dd29b0f5ad7f0d2af4a82214095a1b38b72c1e11ed3
                                                                            • Instruction Fuzzy Hash: 1B511BB1A00209AFDB14CFA8DD85AAEBBB9FB44311F14816AF515E7290E770AE00CF55
                                                                            APIs
                                                                            • GetClientRect.USER32(00000000,?), ref: 0043C2FF
                                                                            • ShowWindow.USER32(00000000,00000006,00000058,00000000,00000000), ref: 0043C391
                                                                              • Part of subcall function 00440DF3: ShowWindow.USER32(00000003,00000000,00004160,00000000,?,?,0043C2F6,?), ref: 00440E4A
                                                                              • Part of subcall function 00440DF3: EnableWindow.USER32(00000000,00000000), ref: 00440E5E
                                                                              • Part of subcall function 00440DF3: ShowWindow.USER32(00000003,00000000,00004160,00000000,?,?,0043C2F6,?), ref: 00440EAB
                                                                              • Part of subcall function 00440DF3: ShowWindow.USER32(00000000,00000004,?,?,0043C2F6,?), ref: 00440EB3
                                                                              • Part of subcall function 00440DF3: EnableWindow.USER32(00000000,00000001), ref: 00440EC7
                                                                              • Part of subcall function 00440DF3: SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00440EEB
                                                                            • ShowWindow.USER32(00000000,00000000,00000058,00000000,00000000), ref: 0043C39F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable$ClientMessageRectSend
                                                                            • String ID:
                                                                            • API String ID: 33439115-0
                                                                            • Opcode ID: 40ed79a081112762abf612aa60e79c16a11a3cbe79436d830e6d614f1b797db4
                                                                            • Instruction ID: 672905dc48b99d706b66b6574e6895404dd24c2ba808b51363bbb33bb23dd04f
                                                                            • Opcode Fuzzy Hash: 40ed79a081112762abf612aa60e79c16a11a3cbe79436d830e6d614f1b797db4
                                                                            • Instruction Fuzzy Hash: 8151F730608340EAE7215F38CDC877B7BA5BB69314F14A45BE543B26A1D7BCA840CB5E
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Init$Clear_memset
                                                                            • String ID: F$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                                                            • API String ID: 3437250866-1153829046
                                                                            • Opcode ID: c2e1d9958f0d7aa538177d83342c53307b4914418d1807aa18b309dc53b4630a
                                                                            • Instruction ID: e821f5128966be974faa0cfed74388a250788acac7db47d10b0d09004602c120
                                                                            • Opcode Fuzzy Hash: c2e1d9958f0d7aa538177d83342c53307b4914418d1807aa18b309dc53b4630a
                                                                            • Instruction Fuzzy Hash: CE81CD72A00219AFDF20DFA4D884EDEB7B8AF04304F50415EF615A7291D7B89E85CB69
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CoTaskMemFree.COMBASE(?), ref: 00428D55
                                                                            • StringFromCLSID.COMBASE(?,?), ref: 00428D35
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • StringFromIID.COMBASE(?,?), ref: 00428E52
                                                                            • CoTaskMemFree.COMBASE(?), ref: 00428E6C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FreeFromStringTask$Message_wcscpy
                                                                            • String ID: CLSID\$Interface\$ProgID$ToolBoxBitmap32$inprocserver32$localserver32
                                                                            • API String ID: 3908383328-2412192186
                                                                            • Opcode ID: 8d163a86d389fc0b40b57f6c24cf890a03ce465061dc8c1a7b4f23301be01532
                                                                            • Instruction ID: 28b7bace9bb34d75845db43a23bf539245773b247e34a785eff03f685e2c8efe
                                                                            • Opcode Fuzzy Hash: 8d163a86d389fc0b40b57f6c24cf890a03ce465061dc8c1a7b4f23301be01532
                                                                            • Instruction Fuzzy Hash: 76617D71209301AFC700EF61D88585FB7A9FF88348F50482EF445E62A1DB79E9498B5A
                                                                            APIs
                                                                              • Part of subcall function 00406339: GetModuleHandleW.KERNEL32(00000000,00000066,?,00000100,?,00406F25,?,?,?,Unterminated string,?), ref: 00406356
                                                                              • Part of subcall function 00406339: LoadStringW.USER32(00000000,?,00406F25,?), ref: 0040635D
                                                                              • Part of subcall function 00406339: _printf.LIBCMT ref: 00406382
                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,C:\Users\user\Desktop\regsvr.exe), ref: 00406D76
                                                                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00406D8D
                                                                            • _wcscpy.LIBCMT ref: 00406DCD
                                                                            • _wcscat.LIBCMT ref: 00406DE2
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00406DF2
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00406F3B
                                                                            Strings
                                                                            • Unterminated string, xrefs: 00406F10
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 00406CDE
                                                                            • Error opening the file, xrefs: 00406D41
                                                                            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00406CEA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$FullHandleLoadModuleNamePathString_printf_wcscat_wcscpy
                                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$C:\Users\user\Desktop\regsvr.exe$Error opening the file$Unterminated string
                                                                            • API String ID: 3880677318-2066809824
                                                                            • Opcode ID: f48b456df21b36b7dde4fed0c0ad37d699c0276e9691097058bdbe164f86c5eb
                                                                            • Instruction ID: 363d3c4044e331e6bf707280c63f17c47f13031cb355ad5cd5efae00aa961de3
                                                                            • Opcode Fuzzy Hash: f48b456df21b36b7dde4fed0c0ad37d699c0276e9691097058bdbe164f86c5eb
                                                                            • Instruction Fuzzy Hash: F861B1720083469ADB21EF50C801FDF7BE8AF85308F05083FF986A2191DB79D659979B
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                            • String ID: 0.0.0.0
                                                                            • API String ID: 2620052-3771769585
                                                                            • Opcode ID: 1dba5a339320690d74ef9bd2776e4f59eea8b64ebc69b8a17c402debd972ef3c
                                                                            • Instruction ID: 6576159ad66fd3fb2ff566f10bafdada74c2173c16ac1c71be99918ab5e1ccaa
                                                                            • Opcode Fuzzy Hash: 1dba5a339320690d74ef9bd2776e4f59eea8b64ebc69b8a17c402debd972ef3c
                                                                            • Instruction Fuzzy Hash: BE11E4719001147AEF10BBB2CC42ADE37ACAF54318F104177B504BA0D2EE7C9A898AA9
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(KERNEL32.DLL,00472810,0000000C,00454BCC,00000000,00000000,?,00000000,00455081,0044EB47,00000001,004548D9,?,00000000), ref: 00454ACC
                                                                            • GetProcAddress.KERNEL32(?,EncodePointer), ref: 00454B00
                                                                            • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00454B10
                                                                            • InterlockedIncrement.KERNEL32(004763A0), ref: 00454B32
                                                                            • __lock.LIBCMT ref: 00454B3A
                                                                            • ___addlocaleref.LIBCMT ref: 00454B59
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                                                            • String ID: DecodePointer$EncodePointer$KERNEL32.DLL$PmG
                                                                            • API String ID: 1036688887-4022621149
                                                                            • Opcode ID: 2661ea3f0638e1064bbf9f40519b0d2430feb54b20b55e3241bdd88832414c48
                                                                            • Instruction ID: dc5c2ea8bde614cc792db02f5a2abed29ba042dcaacd544b6ab2bc80afcc0d3b
                                                                            • Opcode Fuzzy Hash: 2661ea3f0638e1064bbf9f40519b0d2430feb54b20b55e3241bdd88832414c48
                                                                            • Instruction Fuzzy Hash: 1B118670940701AFD7209F75C80179ABBE4BF44319F10851FE89997392E7B8D944CF59
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy
                                                                            • String ID: Exit$Exit$Exit$Script Paused$Script Paused$Script Paused
                                                                            • API String ID: 3048848545-2203000711
                                                                            • Opcode ID: b052645a2dfa8bdad3af04dcb69a3d7d478f87c22335165361279bc74dd104b8
                                                                            • Instruction ID: 348da1acaf8d96e4dba103ed0bb368aec68b5451cb23e833a54dd66dfcce6503
                                                                            • Opcode Fuzzy Hash: b052645a2dfa8bdad3af04dcb69a3d7d478f87c22335165361279bc74dd104b8
                                                                            • Instruction Fuzzy Hash: 3F11197184A38099D301EFAABCD6A5E7F60A762728B540ABED094572F2D3790049CB7D
                                                                            APIs
                                                                            • WSAStartup.WS2_32(00000101,?), ref: 004269DC
                                                                            • FreeLibrary.KERNEL32(?,00000000,00000101,?), ref: 004269C4
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • inet_addr.WS2_32(00000000), ref: 00426A00
                                                                            • gethostbyname.WS2_32(00000000), ref: 00426A0A
                                                                            • _memset.LIBCMT ref: 00426A71
                                                                            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 00426A7D
                                                                            • FreeLibrary.KERNEL32(?,00000000,00000000,00000101,?), ref: 00426AC2
                                                                            • FreeLibrary.KERNEL32(?,00000000,00000000,00000101,?), ref: 00426ACE
                                                                            • FreeLibrary.KERNEL32(?,00000000,00000000,00000101,?), ref: 00426ADA
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00426BD9
                                                                            • WSACleanup.WS2_32 ref: 00426BDF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Free$Library$Global$AllocCleanupMessageStartup_memsetgethostbynameinet_addr
                                                                            • String ID:
                                                                            • API String ID: 2742574630-0
                                                                            • Opcode ID: 0e183e5ed87b915aa1b7cc6d4449dfa966f7a19444f8ec3b29e16ffe4705e3c9
                                                                            • Instruction ID: a919453fccc41775e4647c5b33e6b7f6cc080a7334b136740fd594e217e54653
                                                                            • Opcode Fuzzy Hash: 0e183e5ed87b915aa1b7cc6d4449dfa966f7a19444f8ec3b29e16ffe4705e3c9
                                                                            • Instruction Fuzzy Hash: 9B819131608320ABCB10EF65A841A5BBBE4EF85318F41092FF991E3291C779ED45CB5B
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 0040874D
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 004087ED
                                                                            • GetKeyState.USER32(00000011), ref: 00408801
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 0040881D
                                                                            • GetKeyState.USER32(00000012), ref: 00408826
                                                                            • GetAsyncKeyState.USER32(?), ref: 00408845
                                                                            • GetKeyState.USER32(?), ref: 0040884E
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00408872
                                                                            • GetKeyState.USER32(000000A1), ref: 0040887A
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 0040889A
                                                                            • GetKeyState.USER32(0000005B), ref: 004088A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: f0bc7148331a3a12826116558cc405fd5f42fd13a9c9d4fede8dc4563aeab1c1
                                                                            • Instruction ID: 49a8d46c4f0500cb5570797a9b3f6ca61b17343d43a4eab2c04ecfa008ae406f
                                                                            • Opcode Fuzzy Hash: f0bc7148331a3a12826116558cc405fd5f42fd13a9c9d4fede8dc4563aeab1c1
                                                                            • Instruction Fuzzy Hash: 8E41C2355053449AEB34EF24CA887977B94AF90744F58843ED9C8372C6DF788948CB7A
                                                                            APIs
                                                                            • OleInitialize.OLE32(00000000), ref: 00428924
                                                                            • CLSIDFromProgID.COMBASE(00000000,?), ref: 00428944
                                                                            • CoCreateInstance.COMBASE(?,00000000,00000005,004678E0,?), ref: 004289A8
                                                                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00428A1F
                                                                            • _memset.LIBCMT ref: 00428A2F
                                                                            • _memset.LIBCMT ref: 00428B45
                                                                            • CoCreateInstanceEx.COMBASE(?,00000000,00000010,?,00000001,?), ref: 00428B74
                                                                            • CoSetProxyBlanket.COMBASE(?,?,?,?,?,?,?,00000800), ref: 00428BB2
                                                                            Strings
                                                                            • NULL Pointer assignment, xrefs: 00428BD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstance_memset$BlanketFromProgProxySecurity
                                                                            • String ID: NULL Pointer assignment
                                                                            • API String ID: 662438516-2785691316
                                                                            • Opcode ID: 478fe740e64ff4dfd8d43bd03cc3ee00198a22e5d45fffbc8907c229cec89d2a
                                                                            • Instruction ID: b8cd914e1027da44da0fa057c9d94436d6653ca86a6c9c268abc3a26b8912bb3
                                                                            • Opcode Fuzzy Hash: 478fe740e64ff4dfd8d43bd03cc3ee00198a22e5d45fffbc8907c229cec89d2a
                                                                            • Instruction Fuzzy Hash: 099169B1D00219AFDF10EFA5DC84AEEBBB8FB04308F10456EF505A7251EB799E448B55
                                                                            APIs
                                                                            • __wcsicmp.LIBCMT ref: 004263C8
                                                                            • _wcsncat.LIBCMT ref: 004264D0
                                                                            • _wcsncat.LIBCMT ref: 004264E7
                                                                            • _wcsncat.LIBCMT ref: 00426509
                                                                            • _wcscpy.LIBCMT ref: 00426541
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsncat$Message__wcsicmp_wcscpy
                                                                            • String ID: %s($, $$AUTOITCALLVARIABLE%d$CALLARGARRAY
                                                                            • API String ID: 3855920302-2848625563
                                                                            • Opcode ID: 652eb92f70bd82196a24118808bcafc5e0696d47186ff9d19c612351b9f68d83
                                                                            • Instruction ID: d6190e63be30f02bb565c03451e2f88f1c6807cf34589e290ec74498b0fa6eb6
                                                                            • Opcode Fuzzy Hash: 652eb92f70bd82196a24118808bcafc5e0696d47186ff9d19c612351b9f68d83
                                                                            • Instruction Fuzzy Hash: EA51C772A002186BDF15FFA5D8469EF73A9EB04318F50447FF905F3182EA38AE458A5D
                                                                            APIs
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • _wcscpy.LIBCMT ref: 0040B17B
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,0000002C), ref: 0040B1E7
                                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,0000002C), ref: 0040B29F
                                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000,?,000000FF,00000000,0000002C,?,000000FF,00000000,0000002C), ref: 0040B2BC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info_wcscpy$Default
                                                                            • String ID: ,$Exit$Exit$Script Paused$Script Paused
                                                                            • API String ID: 3556342642-3192828056
                                                                            • Opcode ID: 9f73942c67fa2079e5e9bedb43c9f4073bddb04194ac220655855402fc2a0f7b
                                                                            • Instruction ID: 7ca41266b1e39d2eeb594c2b4204ed57ece2ac72f75c114817d0965d8483089a
                                                                            • Opcode Fuzzy Hash: 9f73942c67fa2079e5e9bedb43c9f4073bddb04194ac220655855402fc2a0f7b
                                                                            • Instruction Fuzzy Hash: 1B510730904244AAEF21EFA9D84879FBBB1EB41354F20847FE861762D1D7BD4A44CB9D
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset_wcscpy_wcsncpy$IconLoadNotifyShell_String
                                                                            • String ID: Line:
                                                                            • API String ID: 1930742743-1585850449
                                                                            • Opcode ID: edd99b903ae735c41f4b472aa62f05d713a6e23da016623e0049ac061481323b
                                                                            • Instruction ID: a1c83a4647b523b593b75610f6452174990dc273f7069fa8f94ecd0bd6f081ed
                                                                            • Opcode Fuzzy Hash: edd99b903ae735c41f4b472aa62f05d713a6e23da016623e0049ac061481323b
                                                                            • Instruction Fuzzy Hash: 43415D72408344AAD321EF55DC85BDFB7E8BB84304F00093FF599A2191EB3499588B5B
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __swprintf$__i64toa__itoa_wcscpy
                                                                            • String ID: %.15g$0x%p$False$True
                                                                            • API String ID: 3260093989-2263619337
                                                                            • Opcode ID: dc37291ea12a4c640794f16defff0e980838e4029e0b5c73597874b065a23686
                                                                            • Instruction ID: 14e876be3d488ff3e9aadbac0904dcdc393aa83d50ae357ce1f3ed625a5a76b8
                                                                            • Opcode Fuzzy Hash: dc37291ea12a4c640794f16defff0e980838e4029e0b5c73597874b065a23686
                                                                            • Instruction Fuzzy Hash: C731D772A04206EAEB20A765DC42F56B7A8FF05304F208477F509E24D1EB78985D9B5A
                                                                            APIs
                                                                              • Part of subcall function 00403615: GetClassNameW.USER32(?,?,000000FF), ref: 00403638
                                                                            • SendMessageW.USER32(?,0000018C,00000000,?), ref: 004022DF
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 004022F0
                                                                            • GetParent.USER32 ref: 00402302
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00402309
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 0040230F
                                                                            • GetParent.USER32 ref: 00402325
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0040232C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 2573188126-1403004172
                                                                            • Opcode ID: ebc464aeefbd4af9651326ffcf6c340f0f11feceff56b765effd4581028ac19f
                                                                            • Instruction ID: c0d53bd78e8ef9695899ed5a7a6ac7a14c24d22a0fd448da908f073b520bda0f
                                                                            • Opcode Fuzzy Hash: ebc464aeefbd4af9651326ffcf6c340f0f11feceff56b765effd4581028ac19f
                                                                            • Instruction Fuzzy Hash: 8B21D270A40114BAEB006BA5CC49AFFBBACEF05354F10046BFA01E32D1D7BD9D119B68
                                                                            APIs
                                                                              • Part of subcall function 00403615: GetClassNameW.USER32(?,?,000000FF), ref: 00403638
                                                                            • SendMessageW.USER32(?,00000186,?,00000000), ref: 0040210A
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 0040211B
                                                                            • GetParent.USER32 ref: 0040212D
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00402134
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 0040213A
                                                                            • GetParent.USER32 ref: 00402150
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00402157
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 2573188126-1403004172
                                                                            • Opcode ID: 058d31418dbd8a0dd80f7aa592518e0b022582e3849baf126690bb8faf79cddf
                                                                            • Instruction ID: 05ed0ba99410c3e0f3fe6d4b3ee9bd10ce47225c1c5e52cfe5d4c2d80d5dfc30
                                                                            • Opcode Fuzzy Hash: 058d31418dbd8a0dd80f7aa592518e0b022582e3849baf126690bb8faf79cddf
                                                                            • Instruction Fuzzy Hash: 3D11B770A41225BAEB006765CC49AFEBBACEF05354F100467F611E72D2D7B99C119B68
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00441536
                                                                            • SendMessageW.USER32(00000000), ref: 00441539
                                                                            • _memset.LIBCMT ref: 0044155E
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00441572
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 004415D4
                                                                            • SendMessageW.USER32(?,00001074,?,00000007), ref: 0044160F
                                                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00441630
                                                                            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 0044164F
                                                                            • SendMessageW.USER32(?,0000101E,00000001,00000000), ref: 00441664
                                                                            • SendMessageW.USER32(?,00001008,?,00000007), ref: 004416B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$_memset
                                                                            • String ID:
                                                                            • API String ID: 1515505866-0
                                                                            • Opcode ID: 18c1d5e27dea04332ca6e0819c9243cfb120140a5bae5d5ab9062ab27ac6ec1e
                                                                            • Instruction ID: 0b3a27045f77bb261558ba6fe20a6bc2357bdfe3a9e411e34c8443787e130321
                                                                            • Opcode Fuzzy Hash: 18c1d5e27dea04332ca6e0819c9243cfb120140a5bae5d5ab9062ab27ac6ec1e
                                                                            • Instruction Fuzzy Hash: B6517D71900248BFEF11DF94CC41BEE7BB5AF09314F14015AFA10AB2E1D7B9A995CB58
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 004082AD
                                                                            • GetForegroundWindow.USER32(00000000), ref: 004082C1
                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 004082CE
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 004082E1
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 004082EF
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,00000000), ref: 00408304
                                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,00000000), ref: 00408314
                                                                            • AttachThreadInput.USER32(00000000,00000000), ref: 00408359
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 0040836D
                                                                            • AttachThreadInput.USER32(?,00000000), ref: 00408379
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                            • String ID:
                                                                            • API String ID: 2156557900-0
                                                                            • Opcode ID: 00dce79af4b6e74bbe8857b7e4496ad65dd51a2c598fa8e692184e87f073a769
                                                                            • Instruction ID: 50dc5e60f148f27fb3ca6f26ab3f4511777edfbedc2d90d1776252501f3e1413
                                                                            • Opcode Fuzzy Hash: 00dce79af4b6e74bbe8857b7e4496ad65dd51a2c598fa8e692184e87f073a769
                                                                            • Instruction Fuzzy Hash: 6A310F70D04204ABCF20DB65DE8496EBBB9AB84750F10847FE841A32A0EB759940CFD8
                                                                            APIs
                                                                            • InterlockedIncrement.KERNEL32(00489FEC), ref: 0041997E
                                                                            • InterlockedDecrement.KERNEL32(00489FEC), ref: 0041998F
                                                                            • Sleep.KERNEL32(0000000A), ref: 00419997
                                                                            • InterlockedIncrement.KERNEL32(00489FEC), ref: 0041999E
                                                                              • Part of subcall function 0041A21D: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 0041A230
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • InterlockedDecrement.KERNEL32(00489FEC), ref: 00419A9D
                                                                            • InterlockedDecrement.KERNEL32(00489FEC), ref: 00419B4D
                                                                            • InterlockedDecrement.KERNEL32(00489FEC), ref: 00419EA2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Interlocked$Decrement$IncrementMessage$Sleep
                                                                            • String ID: @COM_EVENTOBJ
                                                                            • API String ID: 1589888435-2228938565
                                                                            • Opcode ID: 9b5ab465844ed267d5c0b46cf64b12a0b5f25561b8c5908cbb1292f01aa0d31c
                                                                            • Instruction ID: 3ee6a0e4d9e5fa6965528ff373595e1c8ad8c7d67fadfee303b63a2ab6fb0d70
                                                                            • Opcode Fuzzy Hash: 9b5ab465844ed267d5c0b46cf64b12a0b5f25561b8c5908cbb1292f01aa0d31c
                                                                            • Instruction Fuzzy Hash: 03F17971D002099BCF14EFA5D8859EEB7B8BF04308F14446BE915B7292DB38AD85CF59
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00426BE9: GetForegroundWindow.USER32(?), ref: 00426BEF
                                                                              • Part of subcall function 00426BE9: GetWindowRect.USER32(00000000,?), ref: 00426C01
                                                                            • SelectObject.GDI32(?,00000000), ref: 00423173
                                                                            • SelectObject.GDI32(?,?), ref: 0042319B
                                                                            • _malloc.LIBCMT ref: 004231AC
                                                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 004231C4
                                                                            • DeleteObject.GDI32(?), ref: 004231D8
                                                                            • DeleteDC.GDI32(?), ref: 004231E1
                                                                            • GetPixel.GDI32(00000007,00000000,?), ref: 00423292
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Object$DeleteSelectWindow$BitsForegroundMessagePixelRect_malloc
                                                                            • String ID: (
                                                                            • API String ID: 983436255-3887548279
                                                                            • Opcode ID: 47b61701bc552d267229bd066d33c132dade2bd46a011742c1a10bb4d088939b
                                                                            • Instruction ID: a5e41a1a77a1299046c64ea68ed5ec73a8b615b4a5998ca350ee3f67d2e1f268
                                                                            • Opcode Fuzzy Hash: 47b61701bc552d267229bd066d33c132dade2bd46a011742c1a10bb4d088939b
                                                                            • Instruction Fuzzy Hash: 47E1CD30E04269AFCF10DFE8D8856EEBFB2AF05314F5440ABE550B7282C7795A45CB69
                                                                            APIs
                                                                            • _strlen.LIBCMT ref: 0040906A
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • _strlen.LIBCMT ref: 0040907E
                                                                              • Part of subcall function 0044E9ED: std::exception::exception.LIBCMT ref: 0044EA3C
                                                                              • Part of subcall function 0044E9ED: __CxxThrowException@8.LIBCMT ref: 0044EA51
                                                                            • VkKeyScanA.USER32(00000000), ref: 00409119
                                                                            • _sprintf.LIBCMT ref: 00409198
                                                                            • VkKeyScanA.USER32(00000000), ref: 004091CD
                                                                              • Part of subcall function 004083F6: VkKeyScanA.USER32(?), ref: 00408405
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Scan$_strlen$Exception@8Throw_malloc_sprintfstd::exception::exception
                                                                            • String ID: 0%d$down$off
                                                                            • API String ID: 1688272004-2112978555
                                                                            • Opcode ID: f8405180154c2ad1bda66c28b87ceb93a524735fab348719485f1fc0a96b7980
                                                                            • Instruction ID: f5728bd3138d434e1ba3f10ec5be52ab0f7b3eb3d45a64e729055742662fe48e
                                                                            • Opcode Fuzzy Hash: f8405180154c2ad1bda66c28b87ceb93a524735fab348719485f1fc0a96b7980
                                                                            • Instruction Fuzzy Hash: 02C11430609205AAEF148F55C845FBABB71AB45708F1480BFEA417B2C3D67C9D46C75A
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?), ref: 0041839C
                                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 004183BD
                                                                            • UnregisterHotKey.USER32(?), ref: 00418409
                                                                            • FindClose.KERNEL32(?), ref: 004184C5
                                                                            • FreeLibrary.KERNEL32(?), ref: 00418557
                                                                            • VirtualFree.KERNEL32(00008000,00000000,00008000), ref: 004185A9
                                                                            • OleUninitialize.OLE32(0046BF68,00000000,00000000,00000000), ref: 00418679
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Free$Library$CloseFindSendStringUninitializeUnregisterVirtual
                                                                            • String ID: close all
                                                                            • API String ID: 1612041120-3243417748
                                                                            • Opcode ID: 68be926c66576e1d8846893f2918f271ce3e1968c2550404712fc11ce528ba7f
                                                                            • Instruction ID: 0ff10385bef7f6db31c5dadedc31ded73952fb4dca2b603beea13e40fd44ac3a
                                                                            • Opcode Fuzzy Hash: 68be926c66576e1d8846893f2918f271ce3e1968c2550404712fc11ce528ba7f
                                                                            • Instruction Fuzzy Hash: FCB16931504044EFC611BBAAEC8295D37A2FB46398755483FF901A7272CF39AC859B6E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
                                                                            • API String ID: 0-4206948668
                                                                            • Opcode ID: e1edff6608c6ab453c0962dbba3e1aa7d19bbba4afbdb0fab0e52803f9b798d9
                                                                            • Instruction ID: 2b6a14bd9c65df6ab39adb27a746a7df4833eff62a681db2248999a97ff7cbc4
                                                                            • Opcode Fuzzy Hash: e1edff6608c6ab453c0962dbba3e1aa7d19bbba4afbdb0fab0e52803f9b798d9
                                                                            • Instruction Fuzzy Hash: 84A1AB71A10219AFDF14EFA5E885AEEB7B5EF44300F64401FF911A7290E7B89D40CB59
                                                                            APIs
                                                                            • GetProcAddress.KERNEL32(0000007F,00000000), ref: 004058C3
                                                                            • GetProcAddress.KERNEL32(0000007F,AU3_FreeVar), ref: 004058D0
                                                                            • _malloc.LIBCMT ref: 004058FB
                                                                            • _strlen.LIBCMT ref: 00405982
                                                                            • _malloc.LIBCMT ref: 0040598A
                                                                            • _strcat.LIBCMT ref: 00405995
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc_malloc$Message_strcat_strlen
                                                                            • String ID: @$AU3_FreeVar
                                                                            • API String ID: 3818856688-3964185217
                                                                            • Opcode ID: bbe1dbf115c381996aeb7fe85691c8f22739b07111eb0eb0de39e5aa615e2dfd
                                                                            • Instruction ID: 7b7d5ff8284fc4041242c1ba779b5e8589bdbe3cda2b5c1156322a13c702428e
                                                                            • Opcode Fuzzy Hash: bbe1dbf115c381996aeb7fe85691c8f22739b07111eb0eb0de39e5aa615e2dfd
                                                                            • Instruction Fuzzy Hash: 3371A172A00A0A9FDF10AF65C8819AFB7A0FF04315B14453FE805B7291DB7C9950CF59
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004413E0
                                                                            • SendMessageW.USER32(?,00001036,00000000,00000010), ref: 004413EE
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,00001036,00000000,00000010,00000010,SysListView32,0046BF68,00000000,?), ref: 00441406
                                                                            • _wcscat.LIBCMT ref: 00441443
                                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0044145A
                                                                            • SendMessageW.USER32(?,00001061,00000000,0000000F), ref: 0044148C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window_wcscat
                                                                            • String ID: -----$SysListView32
                                                                            • API String ID: 307300125-3975388722
                                                                            • Opcode ID: fbc3f1b382f2f08d9b76450400f4fbce971e13ec3d97e422298fba314c43feb9
                                                                            • Instruction ID: 3786c749294728af4032415c0016cb3ab033b9624890b586acd3afe4326a6c11
                                                                            • Opcode Fuzzy Hash: fbc3f1b382f2f08d9b76450400f4fbce971e13ec3d97e422298fba314c43feb9
                                                                            • Instruction Fuzzy Hash: 86417D31900208EBEF219F64C845BDE7FF4EF08758F15016BF904A62A2D3B99984CF98
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$_wcscat
                                                                            • String ID: *p@$*p@
                                                                            • API String ID: 2037614760-3860410141
                                                                            • Opcode ID: f95e2a06ec0da33a2b24b0d729009966363cce38e9ac136e28d218356bd140dc
                                                                            • Instruction ID: 022abc65a565040fc7d37f2956060ce9ced7e950940044f8a832aa398059bc0a
                                                                            • Opcode Fuzzy Hash: f95e2a06ec0da33a2b24b0d729009966363cce38e9ac136e28d218356bd140dc
                                                                            • Instruction Fuzzy Hash: DD312BB3404215B9DF21BBAA8841ABE7764FF10354F86507BE843365C3CA3D98B2939D
                                                                            APIs
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\regsvr.exe,00000104,0048D8B0,C:\Users\user\Desktop\regsvr.exe,?,?,00406C7E,C:\Users\user\Desktop\regsvr.exe,00000104), ref: 0040C4F9
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 0040CCC8
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0040CCFE
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040CD1A
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040CD34
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040CD5E
                                                                            • _wcscat.LIBCMT ref: 0040CD79
                                                                            • SHFileOperationW.SHELL32(?), ref: 0040CDD8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$Attributes$FullMoveNameOperationPath_wcscatlstrcmpi
                                                                            • String ID: \*.*
                                                                            • API String ID: 2423804421-1173974218
                                                                            • Opcode ID: 927f2329cea3fb4c51c27dd48eaea2a043cee003714d341157ec5d111fdfb4ab
                                                                            • Instruction ID: ab64a8b1db66391e6fb00298c530c9a8b07241a67b377dfd1c09853d48533d42
                                                                            • Opcode Fuzzy Hash: 927f2329cea3fb4c51c27dd48eaea2a043cee003714d341157ec5d111fdfb4ab
                                                                            • Instruction Fuzzy Hash: A84141B180421DAADF10DFB49C859DEB7BCAF09318F5046BBE514F3181E738D6498B58
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000005,80000000,80000000,80000000,80000000,00000000,00000000,00000000,?), ref: 0043DAA3
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 0043DAC0
                                                                            • GetDesktopWindow.USER32 ref: 0043DAC9
                                                                            • GetWindowRect.USER32(00000000), ref: 0043DAD0
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0043DAE1
                                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0043DAF5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$CreateDesktopRect
                                                                            • String ID: ,$tooltips_class32
                                                                            • API String ID: 1032049750-3856767331
                                                                            • Opcode ID: b71b3153f9e58f7de3c7429db650863082a38fe5874105050f6b307e3bdd4bad
                                                                            • Instruction ID: 72087242910ebef34e86a35f731a7ee3f814ce733571841e93bf40c08d15fd13
                                                                            • Opcode Fuzzy Hash: b71b3153f9e58f7de3c7429db650863082a38fe5874105050f6b307e3bdd4bad
                                                                            • Instruction Fuzzy Hash: 89318471A40204BFDB10EFA8DD84EAE7BFCFB49704F14446AFA45E3250D6B999118B64
                                                                            APIs
                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 004099B6
                                                                            • OpenProcess.KERNEL32(00000438,00000000,?,?,?,?,?,?,004024F8,00000028), ref: 004099CC
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,?,?,004024F8,00000028), ref: 004099E1
                                                                            • GetProcAddress.KERNEL32(00000000,VirtualAllocEx), ref: 004099F3
                                                                            • CreateFileMappingW.KERNEL32(000000FF,00000000,00000004,00000000,?,00000000,?,?,?,?,?,004024F8,00000028), ref: 00409A2A
                                                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,?,?,?,?,004024F8,00000028), ref: 00409A41
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FileProcess$AddressCreateLibraryLoadMappingOpenProcThreadViewWindow
                                                                            • String ID: VirtualAllocEx$kernel32.dll
                                                                            • API String ID: 687405250-4123781057
                                                                            • Opcode ID: c1904b9fc30f0923417b7caee397edb0c7834f94d5a4b0b1f195fa57dd2270dc
                                                                            • Instruction ID: 2882448cedf50eb8beea9744bd510d06e24e8b8e6f3abb65c43c34375462d8d3
                                                                            • Opcode Fuzzy Hash: c1904b9fc30f0923417b7caee397edb0c7834f94d5a4b0b1f195fa57dd2270dc
                                                                            • Instruction Fuzzy Hash: 0B21BBB2200209FFDB105F54CC84D7BBBA8FB44359B10453EF696D6291E7749D40DB65
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0041CBA6
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?), ref: 0041CBF9
                                                                            • GetLastError.KERNEL32 ref: 0041CC03
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Error$DiskFreeLastMessageModeSpace
                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                            • API String ID: 409837840-14809454
                                                                            • Opcode ID: c8f04cff7802e7b550b6909b707ad5a85df5219d4a75975e8ca64b08b7213ab5
                                                                            • Instruction ID: 86a4153a38fc339fd75b69d753cbf489c997190e597aa3f288f9b7e6b871df22
                                                                            • Opcode Fuzzy Hash: c8f04cff7802e7b550b6909b707ad5a85df5219d4a75975e8ca64b08b7213ab5
                                                                            • Instruction Fuzzy Hash: 9121F63264420C66C710ABB99D8AEEF7764EB05708B104537F805E6281FA7CDD8186DE
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0041C8C3
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetDriveTypeW.KERNEL32(?), ref: 0041C904
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: DriveErrorMessageModeType
                                                                            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown
                                                                            • API String ID: 3517251692-706929342
                                                                            • Opcode ID: ea9674b7f96dd6e8c38ccc7ad4dd001dece2156570b2d707ac315991a02d9240
                                                                            • Instruction ID: 392e7c7a8151e9c811c593dc5e31bd8079697a73d10b334e2292953d4f7c4739
                                                                            • Opcode Fuzzy Hash: ea9674b7f96dd6e8c38ccc7ad4dd001dece2156570b2d707ac315991a02d9240
                                                                            • Instruction Fuzzy Hash: BC11B6716A810866CB106775DD87ADE3710FB41758B244437B842E62D1EABCECC5869F
                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0043ACE4
                                                                            • RegisterClassExW.USER32(?), ref: 0043AD2F
                                                                            • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 0043AD3A
                                                                            • LoadIconW.USER32(000000A9), ref: 0043AD7D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 975902462-1005189915
                                                                            • Opcode ID: 7a5340438e9abfa1dc68b2dfb1a54458dac8bd12a51d9f26fcb4f8d674e4c82e
                                                                            • Instruction ID: 06e444212cd24750f076d9bf8612b824658396df9a0845f6f816f80cf5a3ffae
                                                                            • Opcode Fuzzy Hash: 7a5340438e9abfa1dc68b2dfb1a54458dac8bd12a51d9f26fcb4f8d674e4c82e
                                                                            • Instruction Fuzzy Hash: F021F771910208EFEB00DFA4ED49BDD7BB4FB09315F10452AE611AA2A0D7F90588CF9A
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000100,?,?,C:\Users\user\Desktop\regsvr.exe), ref: 0040BB4A
                                                                            • LoadStringW.USER32(00000000), ref: 0040BB53
                                                                            • GetModuleHandleW.KERNEL32(00000000,00000068,?,00000100), ref: 0040BB62
                                                                            • LoadStringW.USER32(00000000), ref: 0040BB65
                                                                            • _printf.LIBCMT ref: 0040BB87
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0040BBA5
                                                                            Strings
                                                                            • %s (%d) : ==> %s: %s %s, xrefs: 0040BB82
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 0040BB30
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message_printf
                                                                            • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 220974073-1598792518
                                                                            • Opcode ID: 410cc36363009af3a828ebe82d38b221ee0da9a61af9ecc01913751088ecc8cc
                                                                            • Instruction ID: 5acaa4a208e78139c3278e61eb18a7e01496dd17d942a65ec290cd73e2407d83
                                                                            • Opcode Fuzzy Hash: 410cc36363009af3a828ebe82d38b221ee0da9a61af9ecc01913751088ecc8cc
                                                                            • Instruction Fuzzy Hash: 5C014FE690021C7BE711A7948D85EE7776CDB08344F0044E7BB45F3081EAB4AE854BB9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsncpy$_memset_wcstok$7516Message_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 2115595892-0
                                                                            • Opcode ID: 0e559741c3888d59b009d31f6b999150e70e14ff6c3c65a09e0af5efa8614e03
                                                                            • Instruction ID: 397846afa9139c6f5dca488184eb05a1e01a655e80fe63b60f0869703a8c41e1
                                                                            • Opcode Fuzzy Hash: 0e559741c3888d59b009d31f6b999150e70e14ff6c3c65a09e0af5efa8614e03
                                                                            • Instruction Fuzzy Hash: 92A19F71A00208AADB10EFA6DC829DE7778EF44318F10457FF905B7291EB389A45CF99
                                                                            APIs
                                                                            • GetStartupInfoA.KERNEL32(?), ref: 0045B0E8
                                                                            • __calloc_crt.LIBCMT ref: 0045B0FB
                                                                              • Part of subcall function 00456F77: __calloc_impl.LIBCMT ref: 00456F85
                                                                              • Part of subcall function 00456F77: Sleep.KERNEL32(00000000), ref: 00456F9C
                                                                            • __calloc_crt.LIBCMT ref: 0045B17E
                                                                            • GetFileType.KERNEL32(00000038), ref: 0045B1FE
                                                                            • ___crtInitCritSecAndSpinCount.LIBCMT ref: 0045B232
                                                                            • GetStdHandle.KERNEL32(-000000F6), ref: 0045B288
                                                                            • GetFileType.KERNEL32(00000000), ref: 0045B29A
                                                                            • ___crtInitCritSecAndSpinCount.LIBCMT ref: 0045B2C8
                                                                            • SetHandleCount.KERNEL32 ref: 0045B2F2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Count$CritFileHandleInitSpinType___crt__calloc_crt$InfoSleepStartup__calloc_impl
                                                                            • String ID:
                                                                            • API String ID: 1318386821-0
                                                                            • Opcode ID: 80740bbc2d17eae80b4dfef83e4b3a6a20bfcda720d9ae8a9b7640f2f53294c5
                                                                            • Instruction ID: 48c50c1279a8d309dc57ed5b7784ba91ad1eca9906c5f1647642182917357f77
                                                                            • Opcode Fuzzy Hash: 80740bbc2d17eae80b4dfef83e4b3a6a20bfcda720d9ae8a9b7640f2f53294c5
                                                                            • Instruction Fuzzy Hash: 1E6129715047418EC7118B68DC48B2A7BE0EF12336F24879AEC659B2E2D738D449CBA9
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: InitVariant$_malloc_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 2582978398-0
                                                                            • Opcode ID: a873a48c15ae24db8172ee45b037f6d4f3e101b9b092cb8e25fb18ebb97c53a8
                                                                            • Instruction ID: 8068e766eda6158f977d13777cf56e68e33163e75965930f06032a1715f00e58
                                                                            • Opcode Fuzzy Hash: a873a48c15ae24db8172ee45b037f6d4f3e101b9b092cb8e25fb18ebb97c53a8
                                                                            • Instruction Fuzzy Hash: 4A3150B290064AAFDB00DFB6DC8499ABBACFF48304704892BE919C3641D779E564CF95
                                                                            APIs
                                                                            • GetFileType.KERNEL32(000000FF,000000FF,00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273,?), ref: 00435533
                                                                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273), ref: 0043554A
                                                                            • ReadFile.KERNEL32(000000FF,?,?,?,00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF), ref: 00435564
                                                                            • GetLastError.KERNEL32(?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273,?,00000000,00000000), ref: 0043556E
                                                                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273), ref: 0043557D
                                                                            • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273), ref: 00435589
                                                                            • SetFilePointer.KERNEL32(000000FF,?,00000000,00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273), ref: 00435595
                                                                            • SetLastError.KERNEL32(00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273,?,00000000,00000000), ref: 004355A0
                                                                            • SetLastError.KERNEL32(00000006,000000FF,00000000,?,?,?,004354E8,000000FF,?,?,00000000,000000FF,?,?,00435273,?), ref: 004355AD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$Pointer$ErrorLast$ReadType
                                                                            • String ID:
                                                                            • API String ID: 74101062-0
                                                                            • Opcode ID: 7f8a67f42752878d4db513beec11ca89d9747497a064c1adce2420c73804a72b
                                                                            • Instruction ID: fdde7ecccd58ccd28b5323eca001b2279be93b57a860fd9bb9e787b15cd71c66
                                                                            • Opcode Fuzzy Hash: 7f8a67f42752878d4db513beec11ca89d9747497a064c1adce2420c73804a72b
                                                                            • Instruction Fuzzy Hash: 25116D71900108BFDB119F60CC88C7F3B6EEF493A8B004066F90596254E7749D519BB6
                                                                            APIs
                                                                              • Part of subcall function 00403679: SendMessageTimeoutW.USER32(0046BF68,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00403696
                                                                              • Part of subcall function 00403679: GetWindowThreadProcessId.USER32(0046BF68,00000000), ref: 004036AB
                                                                              • Part of subcall function 00403679: GetCurrentThreadId.KERNEL32 ref: 004036B2
                                                                              • Part of subcall function 00403679: AttachThreadInput.USER32(00000000,?,004034E9), ref: 004036B9
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00401E9A
                                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00401EB8
                                                                            • Sleep.KERNEL32(00000000,?,00000000,00438ABA,00000001,TABRIGHT,TABLEFT,ISENABLED,ISVISIBLE), ref: 00401EBB
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00401EC4
                                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00401EDC
                                                                            • Sleep.KERNEL32(00000000,?,00000000,00438ABA,00000001,TABRIGHT,TABLEFT,ISENABLED,ISVISIBLE), ref: 00401EDF
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00401EE8
                                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00401EFC
                                                                            • Sleep.KERNEL32(00000000,?,00000000,00438ABA,00000001,TABRIGHT,TABLEFT,ISENABLED,ISVISIBLE), ref: 00401EFF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message$PostSleepThreadVirtual$AttachCurrentInputProcessSendTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 2686503918-0
                                                                            • Opcode ID: 6702793ced17b5000555f012982d37de520cdebba95b8c9214a6444e52a16c55
                                                                            • Instruction ID: 0c26a11094f54464014c0082303f67214ec380c461f44fb37c6c4937c8f06428
                                                                            • Opcode Fuzzy Hash: 6702793ced17b5000555f012982d37de520cdebba95b8c9214a6444e52a16c55
                                                                            • Instruction Fuzzy Hash: A9018430144208BFF6202B52DC49F5A7E9DDB45789F110829F281690F0CAF768809A3D
                                                                            APIs
                                                                            • SelectObject.GDI32(00000000,00000005), ref: 0042341C
                                                                            • SelectObject.GDI32(?,?), ref: 00423446
                                                                            • GetDIBits.GDI32(?,00000005,00000000,00000005,00000000,?,00000000), ref: 0042347D
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetDIBits.GDI32(?,00000005,00000000,00000005,00000000,00000028,00000000), ref: 004234B0
                                                                            • DeleteObject.GDI32(00000005), ref: 004234BC
                                                                            • DeleteDC.GDI32(?), ref: 004234C5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitsDeleteSelect$Message
                                                                            • String ID: (
                                                                            • API String ID: 3834983687-3887548279
                                                                            • Opcode ID: 31f3d09dbbab8a9a7916ca3ed333c302104f2726cd835eab182c2fe609e8a6c2
                                                                            • Instruction ID: 5ef8ba6460cd4f5894c0716c63a5e950ba004e219fd443c5a7bb488d96c086fd
                                                                            • Opcode Fuzzy Hash: 31f3d09dbbab8a9a7916ca3ed333c302104f2726cd835eab182c2fe609e8a6c2
                                                                            • Instruction Fuzzy Hash: C9918E72E00218AFCF149FA9DC455AEBFB5EF44305F24812AF905EB250DB788A81DF95
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • _wcspbrk.LIBCMT ref: 004368E3
                                                                            • __swprintf.LIBCMT ref: 0043694C
                                                                            • __swprintf.LIBCMT ref: 00436984
                                                                            • _wcsncpy.LIBCMT ref: 004369C9
                                                                            • __swprintf.LIBCMT ref: 004369EB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __swprintf$Message_wcscpy_wcsncpy_wcspbrk
                                                                            • String ID: %$diouxXeEfgGs
                                                                            • API String ID: 2290775584-4092231847
                                                                            • Opcode ID: 474a544d5fd082cb3add2edce9d4a8518b88581eeeb0772be71d37c604d7588f
                                                                            • Instruction ID: 8e829415d4e2888d003b49b0ac72f3da4eac738e380e8e0951312a0f3b604c8c
                                                                            • Opcode Fuzzy Hash: 474a544d5fd082cb3add2edce9d4a8518b88581eeeb0772be71d37c604d7588f
                                                                            • Instruction Fuzzy Hash: 4A61D172418302A7D324EF69C88596BB3E4FF89314F51992FF881E2252E73CDD48875A
                                                                            APIs
                                                                            • GetClassNameW.USER32(00000000,?,00000400), ref: 00404034
                                                                            • GetWindowTextW.USER32(00000000,?,00000400), ref: 00404072
                                                                            • CharUpperBuffW.USER32(?,00000000), ref: 0040408F
                                                                            • GetClassNameW.USER32(00000000,?,00000400), ref: 00404100
                                                                            • GetWindowTextW.USER32(00000000,?,00000400), ref: 0040413B
                                                                            • GetClassNameW.USER32(00000000,?,00000400), ref: 004041A6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$TextWindow$BuffCharUpper
                                                                            • String ID: ThumbnailClass
                                                                            • API String ID: 2577230361-1241985126
                                                                            • Opcode ID: c443d0d7ae3d9b678318f17cdb92688f46da987f4315337c581a7a9ae3721be4
                                                                            • Instruction ID: cbfdf2b259f29ff357c7fb18f6592c22d514e08fd52421d574a0cc1a2151a8cb
                                                                            • Opcode Fuzzy Hash: c443d0d7ae3d9b678318f17cdb92688f46da987f4315337c581a7a9ae3721be4
                                                                            • Instruction Fuzzy Hash: 3B7153B1904108BFDF21DF61CC44AAABBB9FF44305F1480A7EA45B6196D734DE86CB54
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,0000002C), ref: 0040AD10
                                                                            • IsMenu.USER32(?), ref: 0040AD26
                                                                            • CreatePopupMenu.USER32 ref: 0040AD62
                                                                            • GetMenuItemCount.USER32(?), ref: 0040ADC6
                                                                            • InsertMenuItemW.USER32(?,?,00000001,0000002C), ref: 0040ADED
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                            • String ID: ,$2
                                                                            • API String ID: 93392585-4146714288
                                                                            • Opcode ID: 921160202a71db988153040a7a0feacb5ed1cac0836cf639228291cf51a0be55
                                                                            • Instruction ID: ce37795ca049b3688bfd7b788b34a8157eec92823ee090c7dd515667bc4a57b8
                                                                            • Opcode Fuzzy Hash: 921160202a71db988153040a7a0feacb5ed1cac0836cf639228291cf51a0be55
                                                                            • Instruction Fuzzy Hash: 50518D70900305DBDF20DF64C848BAEBBA5AF54315F24863AE851A66D0E7B89960CB5A
                                                                            APIs
                                                                            • MoveWindow.USER32(?,00000001,?,000000FF,000000FF,00000000,?,000000FF,000000FF,000000FF,static,00000000,00000000,00000001,?,00000000), ref: 004404DE
                                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00440508
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00440510
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00440519
                                                                            • DeleteDC.GDI32(00000000), ref: 00440523
                                                                            • FreeLibrary.KERNEL32(00000001), ref: 00440563
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: DeleteFreeLibraryMessageMoveObjectPixelSelectSendWindow
                                                                            • String ID: static
                                                                            • API String ID: 109832112-2160076837
                                                                            • Opcode ID: c0ee122fbbd450a017091c7509156a9de89e99f6e1020308d054f212af312c37
                                                                            • Instruction ID: 167ea03aa5bc884e29d185edfa03bee2b115640b5cf9c708f34112fddebfbf62
                                                                            • Opcode Fuzzy Hash: c0ee122fbbd450a017091c7509156a9de89e99f6e1020308d054f212af312c37
                                                                            • Instruction Fuzzy Hash: A4415F31800214BFDF119FA5DC48DDF3BB8EF89314F00426AFA25A22A0D7788925DF69
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _logf$Line
                                                                            • String ID: 0DD
                                                                            • API String ID: 3969295912-1049506570
                                                                            • Opcode ID: 9926fbea29d853f44453643d4f9a3b2d157f64b9f27255005079a188cec1aab3
                                                                            • Instruction ID: 001683863537e4e2f1fb7a4e2a66078a22c61dedab29c50d73077a2e83936e49
                                                                            • Opcode Fuzzy Hash: 9926fbea29d853f44453643d4f9a3b2d157f64b9f27255005079a188cec1aab3
                                                                            • Instruction Fuzzy Hash: C331607150010DDFDF046F61EA495EE3F78FF50380F624559E88162165EB3889B1DF99
                                                                            APIs
                                                                              • Part of subcall function 0040A062: _wcscpy.LIBCMT ref: 0040A0FC
                                                                              • Part of subcall function 0040A062: _wcscpy.LIBCMT ref: 0040A10C
                                                                              • Part of subcall function 0040A062: _wcscpy.LIBCMT ref: 0040A12C
                                                                              • Part of subcall function 0040A062: _wcscpy.LIBCMT ref: 0040A137
                                                                            • DestroyCursor.USER32 ref: 00409BC1
                                                                            • DestroyCursor.USER32 ref: 00409BC9
                                                                            • DestroyCursor.USER32 ref: 00409BD1
                                                                            • DestroyCursor.USER32 ref: 00409BD9
                                                                            • DestroyCursor.USER32 ref: 00409BE1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CursorDestroy$_wcscpy
                                                                            • String ID: Exit$Script Paused
                                                                            • API String ID: 256247387-2163292816
                                                                            • Opcode ID: aff04c1962ec9f604ca4ef7e1730cb15275b7ef46051e3d55d0575f8cae06274
                                                                            • Instruction ID: 8f6c6012ffaa7a46f9da8fc18a849473dbe864ac2d6ec31d78b766ae10b1b1ac
                                                                            • Opcode Fuzzy Hash: aff04c1962ec9f604ca4ef7e1730cb15275b7ef46051e3d55d0575f8cae06274
                                                                            • Instruction Fuzzy Hash: 7D114871E052109AE7116F26FC8141DBFA1FB05368750093FE208AB2B2DB365C86EB5D
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00433F9A: CharUpperBuffW.USER32(?,?,?,?,00000000), ref: 00433FAD
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00434BD2
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00434BFB
                                                                            • RegCloseKey.ADVAPI32(?,00000000,00000000), ref: 00434C26
                                                                            • RegDeleteValueW.ADVAPI32(?,00000000), ref: 00434C54
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00434C7C
                                                                            • RegCloseKey.ADVAPI32(?,00000002,00000000), ref: 00434CC2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectDeleteMessageOpenRegistryUpperValue
                                                                            • String ID:
                                                                            • API String ID: 425017642-0
                                                                            • Opcode ID: db03612454f99240be60e479857bc9ca2623b636040d4cc89284cb58197a1023
                                                                            • Instruction ID: 42790630bcba0781485c117772ed592602506a2403a798fb9e9435d98c405882
                                                                            • Opcode Fuzzy Hash: db03612454f99240be60e479857bc9ca2623b636040d4cc89284cb58197a1023
                                                                            • Instruction Fuzzy Hash: 34518E72C00108BBCF10EFA1DC428EEB779EF48318F15556AF901B7291DB39AE409B69
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 00408C1A
                                                                            • GetKeyboardState.USER32(?), ref: 00408C2F
                                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00408C8F
                                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00408CB5
                                                                            • PostMessageW.USER32(?,00000101,?,?), ref: 00408CDF
                                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00408D05
                                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00408D2B
                                                                            • SetKeyboardState.USER32(?), ref: 00408D81
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: df5e2e4aab303cade1a2cb16f41a212c5d2a87eeb06e77b514950e68c2505f49
                                                                            • Instruction ID: d50dee0f36cc695c926402184e3c28f64805c0e7d6a461f6c5a839dea20ee8bc
                                                                            • Opcode Fuzzy Hash: df5e2e4aab303cade1a2cb16f41a212c5d2a87eeb06e77b514950e68c2505f49
                                                                            • Instruction Fuzzy Hash: 7551F67041475C6AEB214739CD45BFB7EE8DF01344F18886EF9D9AA1C2CA789D80DB64
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 00408A12
                                                                            • GetKeyboardState.USER32(?), ref: 00408A27
                                                                            • SetKeyboardState.USER32(?), ref: 00408A91
                                                                            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00408ABD
                                                                            • PostMessageW.USER32(?,00000100,?,?), ref: 00408AE0
                                                                            • PostMessageW.USER32(?,00000100,00000010,?), ref: 00408AFF
                                                                            • PostMessageW.USER32(?,00000100,00000011,?), ref: 00408B1E
                                                                            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00408B71
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 9bc574f981ab146678d9d502e8c91229ab6b776594551fb2521a4d86bc58e748
                                                                            • Instruction ID: c176879fab5291af0d8a1add5bc76fc150dff4048e8cf95a0208d22f89546653
                                                                            • Opcode Fuzzy Hash: 9bc574f981ab146678d9d502e8c91229ab6b776594551fb2521a4d86bc58e748
                                                                            • Instruction Fuzzy Hash: 5451E7B05007586EE72156798D89BFF7AB8EB40344F08486EF5E9A61D2CA7C6940DF24
                                                                            APIs
                                                                            • GetSysColor.USER32(0000000F), ref: 0043B9B0
                                                                            • GetSysColor.USER32(00000005), ref: 0043BA2D
                                                                            • GetSysColor.USER32(00000005), ref: 0043BA51
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0043BA72
                                                                            • SetTextColor.GDI32(?,?), ref: 0043BA90
                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 0043BAA3
                                                                            • GetStockObject.GDI32(00000005), ref: 0043BAAB
                                                                            • SetBkColor.GDI32(?,00000000), ref: 0043BAB8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Color$ModeObjectPixelStockText
                                                                            • String ID:
                                                                            • API String ID: 3335329649-0
                                                                            • Opcode ID: 3bbbc46cfc1cbb526f2e30048087870d29753e9ef8c7783330b90f7d664edd41
                                                                            • Instruction ID: 3e1a90b3df566b46fe10e2d7d2748dc1cf44321494f908229bf81397f2884963
                                                                            • Opcode Fuzzy Hash: 3bbbc46cfc1cbb526f2e30048087870d29753e9ef8c7783330b90f7d664edd41
                                                                            • Instruction Fuzzy Hash: 1E311930608A415BD6257B288C4877A7FC1EF4D324F182217F3A5867F2C3A88C9697DA
                                                                            APIs
                                                                            • GetFocus.USER32 ref: 00443B5D
                                                                            • IsChild.USER32(00000000,00000000), ref: 00443B6F
                                                                            • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 00443B8D
                                                                            • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 00443B99
                                                                            • SendMessageW.USER32(?,000000B1,00000001,0000FFFF), ref: 00443BB7
                                                                            • SendMessageW.USER32(?,000000B1,00000000,FFFF0000), ref: 00443BD0
                                                                            • GetDlgCtrlID.USER32(?), ref: 00443BE2
                                                                            • SetFocus.USER32(00000000,00000000), ref: 00443BF8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Focus$ChildCtrl
                                                                            • String ID:
                                                                            • API String ID: 1532865770-0
                                                                            • Opcode ID: adcfbfc8f4f5a7a3d07d24f273a854bd55fc2bb8986d63186026e0eda8b803e3
                                                                            • Instruction ID: 02016402800605174c8f456f4301c2def5c8974382cd1f014edd1af86c621a2d
                                                                            • Opcode Fuzzy Hash: adcfbfc8f4f5a7a3d07d24f273a854bd55fc2bb8986d63186026e0eda8b803e3
                                                                            • Instruction Fuzzy Hash: 8511B4705043456BF7219F25DC05F2B7EE8EF40B49F14082DF581652D1D7B9E9088B9A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: 01bcccfa0623907894e5014d68cc07ce2b52f2e367987be76801a632a003bbfa
                                                                            • Instruction ID: 3b0ca1872af9b2dc67cb145a3d75ae535922fbc49dfa6bfd2e9439ef43d99484
                                                                            • Opcode Fuzzy Hash: 01bcccfa0623907894e5014d68cc07ce2b52f2e367987be76801a632a003bbfa
                                                                            • Instruction Fuzzy Hash: E0F0F9B6400B486ADA31E7B9DC48BC7B3DC6B84200F454D2AE696C3555DA78F188CB14
                                                                            APIs
                                                                              • Part of subcall function 004446D9: DeleteObject.GDI32(00000000), ref: 00444712
                                                                              • Part of subcall function 004446D9: ExtCreatePen.GDI32(?,00000001,00000000,00000000,00000000,?,?,00000000,?,?), ref: 0044474D
                                                                              • Part of subcall function 004446D9: SelectObject.GDI32(?,00000000), ref: 0044475C
                                                                              • Part of subcall function 004446D9: BeginPath.GDI32(?), ref: 00444773
                                                                              • Part of subcall function 004446D9: SelectObject.GDI32(?,00000000), ref: 00444796
                                                                            • MoveToEx.GDI32(?,-00000010,00000001,?), ref: 004443D8
                                                                            • AngleArc.GDI32(?,-00000010,00000001), ref: 00444423
                                                                              • Part of subcall function 00444946: MoveToEx.GDI32(?,FFFFFFFE,00000000,00000000), ref: 00444984
                                                                              • Part of subcall function 00444946: _logf.LIBCPMT ref: 00444997
                                                                              • Part of subcall function 00444946: _logf.LIBCPMT ref: 004449B5
                                                                              • Part of subcall function 00444946: LineTo.GDI32(?,?,00000000), ref: 004449D1
                                                                            • LineTo.GDI32(?,-00000010,00000001), ref: 00444433
                                                                            • CloseFigure.GDI32(?), ref: 0044443A
                                                                            • Ellipse.GDI32(?,-00000010,?,?,?), ref: 00444486
                                                                            • Rectangle.GDI32(?,-00000010,00000001,-0000000F,00000002), ref: 004444E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Object$LineMoveSelect_logf$AngleBeginCloseCreateDeleteEllipseFigurePathRectangle
                                                                            • String ID:
                                                                            • API String ID: 2270488568-0
                                                                            • Opcode ID: a52131ab50e3b85b290a8081c4bdc1fef5849eb58601cfe73ee5f5e99f0f82b8
                                                                            • Instruction ID: 6da5b42c02b2d1dc1c9181ef8388f99a7fe77f5e4c1647829c6905155f29417e
                                                                            • Opcode Fuzzy Hash: a52131ab50e3b85b290a8081c4bdc1fef5849eb58601cfe73ee5f5e99f0f82b8
                                                                            • Instruction Fuzzy Hash: ED814770D04209AFEF15DF98C889BAEBBB4FF89314F14415AE511B7291C738AA118F69
                                                                            APIs
                                                                            • GetClientRect.USER32(?,?), ref: 0043F1B8
                                                                            • GetWindowRect.USER32(?,?), ref: 0043F1E7
                                                                            • GetClientRect.USER32(?,00000000), ref: 0043F22D
                                                                            • GetWindowRect.USER32(?,?), ref: 0043F275
                                                                            • ScreenToClient.USER32(?,?), ref: 0043F29A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$Client$Window$Screen
                                                                            • String ID: `
                                                                            • API String ID: 1296646539-2679148245
                                                                            • Opcode ID: 6621cd87d08a81463a1af69bd0c42f1ddb8f9a250b8d9b31ea92b7649d581b88
                                                                            • Instruction ID: 3465c166391d92f5db4c8a5de4a8853c6cb642f8e3b451863ea79ad7d3ba27c3
                                                                            • Opcode Fuzzy Hash: 6621cd87d08a81463a1af69bd0c42f1ddb8f9a250b8d9b31ea92b7649d581b88
                                                                            • Instruction Fuzzy Hash: 9F916B79E0070ADACB14CFA8C4846EFFBB1FF08314F14552AE995A3760E734A985CB59
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000), ref: 004351C6
                                                                            • GetStdHandle.KERNEL32(000000F6,0046BF68), ref: 00435207
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetLastError.KERNEL32(00000000), ref: 00435285
                                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 004352B8
                                                                            • GetLastError.KERNEL32(00000000), ref: 004352DE
                                                                            • ReadFile.KERNEL32(?,?,000000FF,?,00000000), ref: 00435387
                                                                            • GetLastError.KERNEL32(00000000), ref: 0043539C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$CodeExitFileHandleMessageProcessRead
                                                                            • String ID:
                                                                            • API String ID: 1559811874-0
                                                                            • Opcode ID: c1ac45fd72a0dccd27cae367a1e0dbfa12a937b3afbc219c3ea4479572b81519
                                                                            • Instruction ID: 9fc56297345dec3520d23637491176040ab01530f8cf5e1f777a7610d00f6f87
                                                                            • Opcode Fuzzy Hash: c1ac45fd72a0dccd27cae367a1e0dbfa12a937b3afbc219c3ea4479572b81519
                                                                            • Instruction Fuzzy Hash: D581F630904608EBCF10AF65C845AEE77B0AF09364F24827BF825A72D1D7788A85CB59
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00433F9A: CharUpperBuffW.USER32(?,?,?,?,00000000), ref: 00433FAD
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00434F71
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00434FB9
                                                                            • RegCloseKey.ADVAPI32(?,00000000,?,00000000), ref: 00434FFA
                                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0043502C
                                                                            • RegCloseKey.ADVAPI32(?,00000000,?,00000000), ref: 00435069
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004350A4
                                                                              • Part of subcall function 00418B7F: GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000003), ref: 00418BA3
                                                                              • Part of subcall function 00418B7F: FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000003), ref: 00418BB5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Close$Message$BuffCharConnectEnumErrorFormatLastOpenRegistryUpperValue
                                                                            • String ID:
                                                                            • API String ID: 980969892-0
                                                                            • Opcode ID: ff84b539c70bd5e76793e219b5fb035a86bd3b7778c90fc8dd44d9ec850093d9
                                                                            • Instruction ID: a467c0aaf9e2d002c05f2fb05d8bf625c584b4418078722113225be4f164aed1
                                                                            • Opcode Fuzzy Hash: ff84b539c70bd5e76793e219b5fb035a86bd3b7778c90fc8dd44d9ec850093d9
                                                                            • Instruction Fuzzy Hash: DB516172D00108ABCF04EFE1D8869DEBB79EF08318F14442BF501B7191DB78AE858B69
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00430E9F
                                                                            • _memset.LIBCMT ref: 00430F60
                                                                            • ShellExecuteExW.SHELL32(?), ref: 00430FA2
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • CloseHandle.KERNEL32(?,00000001), ref: 00431044
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CloseExecuteHandleMessageShell_wcscpy
                                                                            • String ID: @$open
                                                                            • API String ID: 124690895-267353779
                                                                            • Opcode ID: 32d48889e58fefe60ec297321213f7efe84e0b6c76905c8746730d97baa013ac
                                                                            • Instruction ID: 79a6f78ca9893277e11b525ad23edaa7b89c7971ea5e1db8a9703bc8aa29b47c
                                                                            • Opcode Fuzzy Hash: 32d48889e58fefe60ec297321213f7efe84e0b6c76905c8746730d97baa013ac
                                                                            • Instruction Fuzzy Hash: 33517C72D002589BCF20EFA1989699E77A4EB08318F14057BF905BB281DA7C9D85CB99
                                                                            APIs
                                                                              • Part of subcall function 00427AE9: LoadLibraryA.KERNEL32(kernel32.dll,00425D80), ref: 00427AF4
                                                                              • Part of subcall function 00427AE9: GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 00427B06
                                                                            • Sleep.KERNEL32(00000000), ref: 00425D89
                                                                            • Sleep.KERNEL32(00000000), ref: 00425E55
                                                                            • GlobalMemoryStatus.KERNEL32 ref: 00425E68
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,00000003,00000002,00000001), ref: 00425F82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: LibrarySleep$AddressFreeGlobalLoadMemoryProcStatus
                                                                            • String ID: $@
                                                                            • API String ID: 3770225440-1077428164
                                                                            • Opcode ID: ae6e2769acdc6483d6691bdd2877241c15a1d48daa25edbb4aa56e45999e23f0
                                                                            • Instruction ID: 36fb34ed18304f52e7ebc4daf97624bf09186803a6b801568cd4d3704746d347
                                                                            • Opcode Fuzzy Hash: ae6e2769acdc6483d6691bdd2877241c15a1d48daa25edbb4aa56e45999e23f0
                                                                            • Instruction Fuzzy Hash: E8518D30708A14CBE3006F76ED4662AB7E4FF89B08F41486DF9D985292DBB98564C71F
                                                                            APIs
                                                                            • getSystemCP.LIBCMT ref: 00454240
                                                                              • Part of subcall function 004541AD: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004541BA
                                                                              • Part of subcall function 004541AD: GetOEMCP.KERNEL32(00000000), ref: 004541D4
                                                                            • setSBCS.LIBCMT ref: 00454252
                                                                              • Part of subcall function 00453F2A: _memset.LIBCMT ref: 00453F3D
                                                                            • IsValidCodePage.KERNEL32(-00000030), ref: 00454298
                                                                            • GetCPInfo.KERNEL32(00000000,?), ref: 004542AB
                                                                            • _memset.LIBCMT ref: 004542C3
                                                                            • setSBUpLow.LIBCMT ref: 00454396
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Locale_memset$CodeInfoPageSystemUpdateUpdate::_Valid
                                                                            • String ID:
                                                                            • API String ID: 2658552758-0
                                                                            • Opcode ID: bddb2742f32a086ef8fd86ce37615916aa239781cd33c37b6cde83547bbabe72
                                                                            • Instruction ID: 20e0eee75841bc2e5c60e20d229308ec88004ad5df90a6ae24ddff937b37c46d
                                                                            • Opcode Fuzzy Hash: bddb2742f32a086ef8fd86ce37615916aa239781cd33c37b6cde83547bbabe72
                                                                            • Instruction Fuzzy Hash: 4D51E830A042159BDB15CF65C4812BEBBB4EF8534AF1440ABEC95DF253D73C898ACB99
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 0040335E
                                                                            • __swprintf.LIBCMT ref: 004033F3
                                                                            • GetDlgCtrlID.USER32(?), ref: 0040341A
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00403445
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0040347C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName$CtrlTextWindow__swprintf
                                                                            • String ID: %s%u
                                                                            • API String ID: 1494404061-679674701
                                                                            • Opcode ID: 096c522bd2d9aaca38537f46ee95da6ec7e5801da3ad91ee026391c232d43d37
                                                                            • Instruction ID: 0888d887ebef4d6566b50af7a3b30fa5b5dc89e100164802d73fcd70751c484f
                                                                            • Opcode Fuzzy Hash: 096c522bd2d9aaca38537f46ee95da6ec7e5801da3ad91ee026391c232d43d37
                                                                            • Instruction Fuzzy Hash: E441E972500704AFDB22DF61CC84AABBBBCFB00306F1045BBE546D6581E779FA898B55
                                                                            APIs
                                                                            • ShowWindow.USER32(?,00000000), ref: 0043F6DD
                                                                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 0043F6E3
                                                                            • SetFocus.USER32(?,?,00000000), ref: 0043F6EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow$Focus
                                                                            • String ID:
                                                                            • API String ID: 3918694803-0
                                                                            • Opcode ID: 8b8c8c928160894ec18fd1c00cd3b4219fb3340570874c3d861df759491bb647
                                                                            • Instruction ID: 225f73440f05c295bf9ba1c591afbc958af972752b278ad712563bc184ad98ad
                                                                            • Opcode Fuzzy Hash: 8b8c8c928160894ec18fd1c00cd3b4219fb3340570874c3d861df759491bb647
                                                                            • Instruction Fuzzy Hash: 4E410A74D00204BEEF308F24CDC5F6E7B64AB0D364F20297BF542A27A1C779AD499A59
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsncpy$LocalTime_strtol
                                                                            • String ID:
                                                                            • API String ID: 3624483480-0
                                                                            • Opcode ID: 40cc7a637b6f2338651b91aa49790e24c7065cbc306a22772c63ecafda8aa6a9
                                                                            • Instruction ID: 5e051624fdc212ea3451c999b0155efd0865022393acda4f482468b8ee5f6b8c
                                                                            • Opcode Fuzzy Hash: 40cc7a637b6f2338651b91aa49790e24c7065cbc306a22772c63ecafda8aa6a9
                                                                            • Instruction Fuzzy Hash: B64182A2C11619B6DF10EBE6CC859EF73ACBF14308F45482BF915F3142E678D60987A9
                                                                            APIs
                                                                            • __mtinitlocknum.LIBCMT ref: 0045B739
                                                                              • Part of subcall function 0045546F: __FF_MSGBANNER.LIBCMT ref: 0045548B
                                                                            • __lock.LIBCMT ref: 0045B74D
                                                                            • __lock.LIBCMT ref: 0045B796
                                                                            • ___crtInitCritSecAndSpinCount.LIBCMT ref: 0045B7B1
                                                                            • RtlEnterCriticalSection.NTDLL(?), ref: 0045B7D7
                                                                            • RtlLeaveCriticalSection.NTDLL(?), ref: 0045B7E4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection__lock$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
                                                                            • String ID:
                                                                            • API String ID: 2236623020-0
                                                                            • Opcode ID: 340911b5a6da731d01b31620caaee38d199164dfaefa5e97a6627965af7cecf1
                                                                            • Instruction ID: b75c6b8aee8c271de0bc160daeda08099923d1da712b298870f45d695b404e12
                                                                            • Opcode Fuzzy Hash: 340911b5a6da731d01b31620caaee38d199164dfaefa5e97a6627965af7cecf1
                                                                            • Instruction Fuzzy Hash: B9413930D007068BDB20AF65C84576DBBE4EF45336F24821FD822562D2C77C8949CB9D
                                                                            APIs
                                                                              • Part of subcall function 00426BE9: GetForegroundWindow.USER32(?), ref: 00426BEF
                                                                              • Part of subcall function 00426BE9: GetWindowRect.USER32(00000000,?), ref: 00426C01
                                                                            • GetDesktopWindow.USER32 ref: 00423A7A
                                                                            • GetWindowRect.USER32(00000000), ref: 00423A81
                                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00423AB3
                                                                              • Part of subcall function 0040D649: Sleep.KERNEL32(000000FA,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 0040D6CF
                                                                            • GetCursorPos.USER32(?), ref: 00423AE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rect$CursorDesktopForegroundSleepmouse_event
                                                                            • String ID: d
                                                                            • API String ID: 547981324-2564639436
                                                                            • Opcode ID: 83cee22ebd948f6d7cf26cbc37683e2e883b76dba3aadd7f2c49ba425ade0615
                                                                            • Instruction ID: 8df8fd94db31a35fb48a586cabb2f7c8105256e0e33bd1acbfcca329d50d5c7f
                                                                            • Opcode Fuzzy Hash: 83cee22ebd948f6d7cf26cbc37683e2e883b76dba3aadd7f2c49ba425ade0615
                                                                            • Instruction Fuzzy Hash: 0631E772308315AFD700DF54DC85F6A7BE9FB88308F40053AF588D6192E678EA49CB96
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,0000002C), ref: 00440F7C
                                                                            • IsMenu.USER32(?), ref: 00440F8F
                                                                            • CreatePopupMenu.USER32 ref: 00440F99
                                                                            • InsertMenuItemW.USER32(?,?,00000001,0000002C), ref: 00440FCB
                                                                            • DrawMenuBar.USER32(?), ref: 00440FD3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CreateDrawInfoInsertPopup
                                                                            • String ID: ,
                                                                            • API String ID: 2727366139-3772416878
                                                                            • Opcode ID: b0d788992a31a387628c016495ab1bab4e0a02631a340dd072e6b7fd9bf57b65
                                                                            • Instruction ID: 6b78c16b7d82ca5ed1d585d58f60ca6dd34e1e15268e67fcb64b487a493cbbd9
                                                                            • Opcode Fuzzy Hash: b0d788992a31a387628c016495ab1bab4e0a02631a340dd072e6b7fd9bf57b65
                                                                            • Instruction Fuzzy Hash: AB319E75900208EFEF10CF54D844ADEBBB5FF48314F10816AE901AB360DBB4E919CB64
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00440A00
                                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00440A0F
                                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00440A1A
                                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00440A29
                                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00440A35
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Msctls_Progress32
                                                                            • API String ID: 3850602802-3636473452
                                                                            • Opcode ID: 697f27f51b90500546e756a9eaa3db5516726332e831bae7c374c23cda2bfaf1
                                                                            • Instruction ID: b92dbeaa2a059efcea1236ff011c2dea35a5b81120707142e99da2675fd37147
                                                                            • Opcode Fuzzy Hash: 697f27f51b90500546e756a9eaa3db5516726332e831bae7c374c23cda2bfaf1
                                                                            • Instruction Fuzzy Hash: C31173B1500219BEFF115F608C81EEB7F29FB14368F204126F714651A1C7765C61EB58
                                                                            APIs
                                                                            • TlsGetValue.KERNEL32(00000000,0045499F,00000000,00460676,00000000,00000000,00000314,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 00454937
                                                                            • TlsGetValue.KERNEL32(00000006,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 0045494E
                                                                            • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00478A90,00455345,00478A90,Microsoft Visual C++ Runtime Library,00012010), ref: 00454963
                                                                            • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0045497E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$AddressHandleModuleProc
                                                                            • String ID: EncodePointer$KERNEL32.DLL
                                                                            • API String ID: 1929421221-3682587211
                                                                            • Opcode ID: 808edc22024412fc92907a0ad2dfa4efd85087c52e9ced06c6dec172512a9143
                                                                            • Instruction ID: 533f86644e208d988e5729208b4243dde29ae67d0476ed6a780933ee63da5ef4
                                                                            • Opcode Fuzzy Hash: 808edc22024412fc92907a0ad2dfa4efd85087c52e9ced06c6dec172512a9143
                                                                            • Instruction Fuzzy Hash: 98F0F6B01016239F8B215B34DC019AB7AD89F80369715413BFD1CD6371EB36CCC58A5E
                                                                            APIs
                                                                            • TlsGetValue.KERNEL32(00000000,00454A51,?,0045321E), ref: 004549AE
                                                                            • TlsGetValue.KERNEL32(00000006,?,0045321E), ref: 004549C5
                                                                            • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,0045321E), ref: 004549DA
                                                                            • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 004549F5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$AddressHandleModuleProc
                                                                            • String ID: DecodePointer$KERNEL32.DLL
                                                                            • API String ID: 1929421221-629428536
                                                                            • Opcode ID: d360f46e1e7009b55880cfe4a8153529ec0e511f63e662ce4631ffc73fcc35e1
                                                                            • Instruction ID: 5865600a878e118214431f304109912cd63f15fec1153728a7111d625ecce679
                                                                            • Opcode Fuzzy Hash: d360f46e1e7009b55880cfe4a8153529ec0e511f63e662ce4631ffc73fcc35e1
                                                                            • Instruction Fuzzy Hash: 08F090B0105612AB97119B35DC0496B3A98AF81769B054137FC08DB3B1EB78CCC58AAE
                                                                            APIs
                                                                            • CreateMenu.USER32 ref: 0043EB10
                                                                            • SetMenu.USER32(?,00000000), ref: 0043EB1C
                                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0043EFA9
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0043EFB7
                                                                            • SelectObject.GDI32(00000000,?), ref: 0043EFCD
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,0041F974), ref: 0043F07E
                                                                              • Part of subcall function 0040FB8E: VariantClear.OLEAUT32(?), ref: 0040FBA8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MenuObjectSelect$ClearCreateMessageMoveSendVariantWindow
                                                                            • String ID:
                                                                            • API String ID: 3124450003-0
                                                                            • Opcode ID: 04e2c97309e15f0b7c36aec3af94c50112fe3fa6c9cfe41d9cf8f9396a92371a
                                                                            • Instruction ID: 3b512a8d21eae42477d40c86f313bff1a5d2463d4effeef441b6316fbb0c2069
                                                                            • Opcode Fuzzy Hash: 04e2c97309e15f0b7c36aec3af94c50112fe3fa6c9cfe41d9cf8f9396a92371a
                                                                            • Instruction Fuzzy Hash: 31F15475900208EFCF11DFA9C8409EEBBB5FF4C318F11416AFA15A72A1C339A915DB69
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __lseeki64
                                                                            • String ID:
                                                                            • API String ID: 1457047535-0
                                                                            • Opcode ID: c3b436a5ed31a2c957ecc9bdbb847634a5603994dfcb4148424a658564f4665c
                                                                            • Instruction ID: 42937746112e8413a9c1ac339922f728f355006fcfe38c55f587a455e63e89f8
                                                                            • Opcode Fuzzy Hash: c3b436a5ed31a2c957ecc9bdbb847634a5603994dfcb4148424a658564f4665c
                                                                            • Instruction Fuzzy Hash: FC91C231A00305CFDB24CFA5C981BAEB7B5EF45306F24852ED95A9B293D7789C49CB09
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • select.WS2_32(00000000,?,00000000,00000000,?), ref: 00427413
                                                                            • WSAGetLastError.WS2_32(00000000,00000000,?,?,00000000,?,00000010,00000000,?,00000000,?,00000000,00000000,?,0046BF68), ref: 0042741E
                                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,?,00000000,00000000,?,0046BF68), ref: 00427440
                                                                            • inet_ntoa.WS2_32(?), ref: 00427486
                                                                            • htons.WS2_32(?), ref: 004274C1
                                                                            • _strlen.LIBCMT ref: 004274FD
                                                                              • Part of subcall function 0040DED4: _strlen.LIBCMT ref: 0040DEEB
                                                                              • Part of subcall function 0040DED4: MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,00000000,00000000,?,?,0040B8B1,00000000,?,00000000,?), ref: 0040DF05
                                                                              • Part of subcall function 0040DED4: MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,0040B8B1,00000000,?,00000000,?,00000FFF,00000000,0040B879), ref: 0040DF39
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide_strlen$ErrorLastMessagehtonsinet_ntoaselect
                                                                            • String ID:
                                                                            • API String ID: 169474820-0
                                                                            • Opcode ID: 10d9404e8603112583ddc4039bbeb60a2f50699b26ca687b2ac5954019e85098
                                                                            • Instruction ID: 6e0c69cd61be4cc5f269528603ffc3782b608e791363e538b283036aaec128aa
                                                                            • Opcode Fuzzy Hash: 10d9404e8603112583ddc4039bbeb60a2f50699b26ca687b2ac5954019e85098
                                                                            • Instruction Fuzzy Hash: 4351B731A04214BADB14ABF5AC46ADF77A9EF44324F24446FF501E71C2DA7C9D408B6D
                                                                            APIs
                                                                              • Part of subcall function 00437A84: IsWindow.USER32(00000000), ref: 00437AB1
                                                                            • GetMenu.USER32(00000000), ref: 004399F5
                                                                            • GetMenuItemCount.USER32(?), ref: 00439A17
                                                                            • GetMenuStringW.USER32(?,00000000,?,00007FFF,00000400), ref: 00439A43
                                                                            • GetMenuItemID.USER32(?,00000000), ref: 00439A9E
                                                                            • GetSubMenu.USER32(?,00000000), ref: 00439AA9
                                                                            • PostMessageW.USER32(00000000,00000111,?,00000000), ref: 00439AF2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountMessagePostStringWindow
                                                                            • String ID:
                                                                            • API String ID: 3481743490-0
                                                                            • Opcode ID: 1691902da14441a05051a724cd4b3b255826e61b5149bfa2e502c573869a565e
                                                                            • Instruction ID: 67941c42c60014dd09f3b9fefb958ce7e9d4e4dedf88b28e4c746eeb01a3303e
                                                                            • Opcode Fuzzy Hash: 1691902da14441a05051a724cd4b3b255826e61b5149bfa2e502c573869a565e
                                                                            • Instruction Fuzzy Hash: FB41D571E04218BBDB10ABA59C45AAEBBB4FF48314F14416BF504F7281D7B89E41CF99
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 0043B624
                                                                            • ScreenToClient.USER32(00000000,?), ref: 0043B641
                                                                            • GetAsyncKeyState.USER32(00000001), ref: 0043B681
                                                                            • GetKeyState.USER32(00000001), ref: 0043B68F
                                                                            • GetAsyncKeyState.USER32(00000002), ref: 0043B6A9
                                                                            • GetKeyState.USER32(00000002), ref: 0043B6B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$ClientCursorScreen
                                                                            • String ID:
                                                                            • API String ID: 1890669589-0
                                                                            • Opcode ID: 632d3824c98a44142a6629b2c69fbb66ce52258f6baecd437a0d8d5fc89c5528
                                                                            • Instruction ID: e68edc413b1988579f9a0f30517d8b9ae4c20ae91bb67c17d214006dc1035c13
                                                                            • Opcode Fuzzy Hash: 632d3824c98a44142a6629b2c69fbb66ce52258f6baecd437a0d8d5fc89c5528
                                                                            • Instruction Fuzzy Hash: 0641B270A04105BFCF159FA4C849BE9BB74FF58368F109257EA24622E1C7786950CFDA
                                                                            APIs
                                                                            • ShowWindow.USER32(00000003,00000000,00004160,00000000,?,?,0043C2F6,?), ref: 00440E4A
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00440E5E
                                                                            • ShowWindow.USER32(00000003,00000000,00004160,00000000,?,?,0043C2F6,?), ref: 00440EAB
                                                                            • ShowWindow.USER32(00000000,00000004,?,?,0043C2F6,?), ref: 00440EB3
                                                                            • EnableWindow.USER32(00000000,00000001), ref: 00440EC7
                                                                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00440EEB
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 642888154-0
                                                                            • Opcode ID: d442cd6f61d1f2eb60edba35bc5951856968bf1c1bdbe95bfc4ca9bf64b8f612
                                                                            • Instruction ID: 04e1f9be1dd60fe343278cffdea815464e7b55a2bb7467d10093015c31436ddc
                                                                            • Opcode Fuzzy Hash: d442cd6f61d1f2eb60edba35bc5951856968bf1c1bdbe95bfc4ca9bf64b8f612
                                                                            • Instruction Fuzzy Hash: 5F319EB0504340AFFB31DB28D884B967BF0AF05704F240C9AE6519B2A1C379EDB4DB19
                                                                            APIs
                                                                              • Part of subcall function 004446D9: DeleteObject.GDI32(00000000), ref: 00444712
                                                                              • Part of subcall function 004446D9: ExtCreatePen.GDI32(?,00000001,00000000,00000000,00000000,?,?,00000000,?,?), ref: 0044474D
                                                                              • Part of subcall function 004446D9: SelectObject.GDI32(?,00000000), ref: 0044475C
                                                                              • Part of subcall function 004446D9: BeginPath.GDI32(?), ref: 00444773
                                                                              • Part of subcall function 004446D9: SelectObject.GDI32(?,00000000), ref: 00444796
                                                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 00444627
                                                                            • LineTo.GDI32(?,?,?), ref: 0044462F
                                                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 0044463D
                                                                            • LineTo.GDI32(?,?,?), ref: 00444645
                                                                            • EndPath.GDI32(?), ref: 00444658
                                                                            • StrokePath.GDI32(?), ref: 00444666
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                                                            • String ID:
                                                                            • API String ID: 372113273-0
                                                                            • Opcode ID: 994ddddf9d201f7b03338eae7e5c2f3aab0ec1c5256e586afd36d0d25f8ad3e3
                                                                            • Instruction ID: ad4d0355907c7f6f3f9405d28c9002b125f499cf2e31db4bd4b76a32c17b4eaa
                                                                            • Opcode Fuzzy Hash: 994ddddf9d201f7b03338eae7e5c2f3aab0ec1c5256e586afd36d0d25f8ad3e3
                                                                            • Instruction Fuzzy Hash: 0CF0C2B2004248BFE320AB72EC4CF9B3B5CDBC6368F024525F602D6191E678A904CB79
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0040BC0F
                                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0040BC27
                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 0040BC39
                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 0040BC48
                                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0040BC52
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040BC59
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 839392675-0
                                                                            • Opcode ID: a73f713adff4fe7835ce9ca597ba216ac3381ca59818c4e6d44cc076613e6194
                                                                            • Instruction ID: bdf738185f33ef483c2b98843bad14443f55a88d359c573a1cedbd21710165fd
                                                                            • Opcode Fuzzy Hash: a73f713adff4fe7835ce9ca597ba216ac3381ca59818c4e6d44cc076613e6194
                                                                            • Instruction Fuzzy Hash: 7BF06D76205118BBDB201B51DC0DEEF3E6CEF46BA9F004065FA06A40A0E7B15942DBA9
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • CoInitialize.OLE32(00000000), ref: 0041D514
                                                                            • CoCreateInstance.COMBASE(004677D0,00000000,00000001,004677C0,?), ref: 0041D52B
                                                                            • _wcsncpy.LIBCMT ref: 0041D562
                                                                            • CoUninitialize.COMBASE ref: 0041D6BD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstanceMessageUninitialize_wcsncpy
                                                                            • String ID: .lnk
                                                                            • API String ID: 838818076-24824748
                                                                            • Opcode ID: bd5e95774e99e44085864b2f5abfe0a59b2c17ea35c322b81c6ff74b6a01e153
                                                                            • Instruction ID: a872a461cc8d50caaa2b3f8997db518f3534c7efa4dbd710ffcac2bdd0e70920
                                                                            • Opcode Fuzzy Hash: bd5e95774e99e44085864b2f5abfe0a59b2c17ea35c322b81c6ff74b6a01e153
                                                                            • Instruction Fuzzy Hash: 9B619572600204AFDB14ABA1DC4AEDE3779EF85714F10445EF509EB1D1DAB9AE80CB58
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00431775,?,?), ref: 00431E58
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharLower
                                                                            • String ID: cdecl$none$stdcall$winapi
                                                                            • API String ID: 2358735015-567219261
                                                                            • Opcode ID: b66d592f4f27b63a0f851651bd71964ec15a8cf0ea215bbb536c6a778a1c2908
                                                                            • Instruction ID: 81781ea8b2f6e403ff59936e65187d67ad1d0bebd1bf28a57343ce1c93d0d1ef
                                                                            • Opcode Fuzzy Hash: b66d592f4f27b63a0f851651bd71964ec15a8cf0ea215bbb536c6a778a1c2908
                                                                            • Instruction Fuzzy Hash: D7410A31900204ABDF01AB6ADC56BDDB771AF08324F10851BF915371E2CB7D9D15CB98
                                                                            APIs
                                                                              • Part of subcall function 00403615: GetClassNameW.USER32(?,?,000000FF), ref: 00403638
                                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 004021F0
                                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00402201
                                                                            • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 0040222C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 787153527-1403004172
                                                                            • Opcode ID: 898ac08608374f15b5b16731521431cbb808f51328000e89ad0e24fb265d8cd6
                                                                            • Instruction ID: 9af8fa7d92531f2ec2c56fa7967ba8fa3a3339690c273f768e22c448ddef34d2
                                                                            • Opcode Fuzzy Hash: 898ac08608374f15b5b16731521431cbb808f51328000e89ad0e24fb265d8cd6
                                                                            • Instruction Fuzzy Hash: B2212470A40104BEEB006BA5CD0ABEEBB64DF01328F20416BF510B72E1DBBD5E129B59
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,0000002C), ref: 00441089
                                                                            • IsMenu.USER32(?), ref: 0044109C
                                                                            • InsertMenuItemW.USER32(?,?,00000001,0000002C), ref: 004410E4
                                                                            • DrawMenuBar.USER32(?), ref: 004410F4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$DrawInfoInsert
                                                                            • String ID: ,
                                                                            • API String ID: 3076010158-3772416878
                                                                            • Opcode ID: c6d424252407d8f875bef89aa79cfb009d7e2d0d0ffdc2a44d3c02ee0069f7a6
                                                                            • Instruction ID: 94d219916aabe59cf8be8086ff4fa6ae86bf9718367653b9dd1110ae4213215f
                                                                            • Opcode Fuzzy Hash: c6d424252407d8f875bef89aa79cfb009d7e2d0d0ffdc2a44d3c02ee0069f7a6
                                                                            • Instruction Fuzzy Hash: A1318A70A00248EFEB20CF64D884A9ABBB5FB45304F15816AE911AB360D7B5DD85CFA5
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00409F7D
                                                                            • DestroyCursor.USER32(00000000), ref: 00409FC7
                                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 0040A040
                                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040A049
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_$CursorDestroy_memset
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 2080917435-2994071119
                                                                            • Opcode ID: 2e1054269ffcf066c85cc887bfceafdd98ff9cc22412f061c7e94965030fa91b
                                                                            • Instruction ID: 622c5b33f7b39ef390b4a455ff65f4841c0ac71e9bcdc7e13409dfded8dbb7b1
                                                                            • Opcode Fuzzy Hash: 2e1054269ffcf066c85cc887bfceafdd98ff9cc22412f061c7e94965030fa91b
                                                                            • Instruction Fuzzy Hash: A531FBB1604746AFC714DF24D884696BBE4FB44304F00493EE568E3391E7B5A9688BDA
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$_sprintf
                                                                            • String ID: %02X
                                                                            • API String ID: 891462717-436463671
                                                                            • Opcode ID: b5b7a4a62f4357529c1e8bccbba1271ea6ef58b4b549224982d3f89143285198
                                                                            • Instruction ID: 9f2adef8050b744f28e7ad8e2a979b567bcd00562cc96329734852113e79bc63
                                                                            • Opcode Fuzzy Hash: b5b7a4a62f4357529c1e8bccbba1271ea6ef58b4b549224982d3f89143285198
                                                                            • Instruction Fuzzy Hash: 40112B717403083AD700F6659D92FEE736CDB44748F50056FF741E60C2EAE8A94D8769
                                                                            APIs
                                                                            • __calloc_crt.LIBCMT ref: 00452708
                                                                            • CreateThread.KERNEL32(?,?,V#,00000000,?,0040C0FE), ref: 0045274C
                                                                            • GetLastError.KERNEL32(?,00000000,?,?,0040C0B8,00000000,00000000,0040C0FE,?,00000000,?), ref: 00452756
                                                                            • __dosmaperr.LIBCMT ref: 0045276E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CreateErrorLastThread__calloc_crt__dosmaperr
                                                                            • String ID: V#
                                                                            • API String ID: 84609068-3009074967
                                                                            • Opcode ID: 741dece9c410d0b61a250213453242e7faf0902deb50ab961b45b2ea7268e2a6
                                                                            • Instruction ID: 3a42acb9d943d4bc965953ef35302ce43316fec0af8afefa5cd7e4b587975d09
                                                                            • Opcode Fuzzy Hash: 741dece9c410d0b61a250213453242e7faf0902deb50ab961b45b2ea7268e2a6
                                                                            • Instruction Fuzzy Hash: 8E110472505205AFCB10FFA5DD8289F77A4FF0532AB20442FF80092193D7B89D488AA9
                                                                            APIs
                                                                              • Part of subcall function 00454A33: TlsGetValue.KERNEL32(?,0045321E), ref: 00454A3A
                                                                              • Part of subcall function 00454A33: TlsSetValue.KERNEL32(00000000,0045321E), ref: 00454A5B
                                                                              • Part of subcall function 00454A18: TlsGetValue.KERNEL32(?,00453229,00000000), ref: 00454A22
                                                                            • GetLastError.KERNEL32(00000000,?,00000000,?,?), ref: 00452676
                                                                            • RtlExitUserThread.NTDLL(00000000,?,?), ref: 0045267D
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00452683
                                                                            • __freefls@4.LIBCMT ref: 004526A4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$Thread$CurrentErrorExitLastUser__freefls@4
                                                                            • String ID: PYE
                                                                            • API String ID: 1282264671-4264731808
                                                                            • Opcode ID: 0ed4346b27e7eb263dc075c6e17bc7c2508221cbf64e85cc55695adc212ce19c
                                                                            • Instruction ID: c1cb4acfb2569e177315e6c1e4ffed880b56d8b235b71d2e61a470ac72be7a98
                                                                            • Opcode Fuzzy Hash: 0ed4346b27e7eb263dc075c6e17bc7c2508221cbf64e85cc55695adc212ce19c
                                                                            • Instruction Fuzzy Hash: 34015270504201EFDB04BB62D90595E77A8AF8530EB11845FFD0497223E77CCC498B6E
                                                                            APIs
                                                                            • MoveWindow.USER32(?,?,?,?,004422B8,00000000,00000000,00000000,00000000,00000000,0048A010,?,?), ref: 00443E58
                                                                            • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00443E72
                                                                            • InvalidateRect.USER32(?,00000000,00000001,0048A010,?,?,?,?,?,?,004422B8,?,?), ref: 00443EA0
                                                                            • SendMessageW.USER32(?,00000469,?,00000000), ref: 00443EBF
                                                                            • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,004422B8,?,?), ref: 00443EDD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$InvalidateMoveRectShow
                                                                            • String ID:
                                                                            • API String ID: 3626129698-0
                                                                            • Opcode ID: e11df4ef5a1721bb908d9c22da332fa96f277a4f81634fc398dace3eada7503f
                                                                            • Instruction ID: 8065920ccdc99479be972d1b7ab0181fe160fcbfeccb06d76261e45fb94ae6e6
                                                                            • Opcode Fuzzy Hash: e11df4ef5a1721bb908d9c22da332fa96f277a4f81634fc398dace3eada7503f
                                                                            • Instruction Fuzzy Hash: B9A1A171D0161ADFEB14CFA9C5856BEBBF1FF08B02F24441AD981A3754D338AA41CB54
                                                                            APIs
                                                                            • GetCurrentProcessId.KERNEL32(0046BF68), ref: 00430450
                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 0043045D
                                                                            • FreeLibrary.KERNEL32(?,00000000), ref: 004304AA
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00433DAB: LoadLibraryA.KERNEL32(kernel32.dll,0043048B), ref: 00433DB6
                                                                              • Part of subcall function 00433DAB: GetProcAddress.KERNEL32(00000000,GetProcessIoCounters), ref: 00433DC8
                                                                            • FreeLibrary.KERNEL32(?), ref: 00430649
                                                                            • CloseHandle.KERNEL32(000000FF), ref: 00430653
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$FreeProcess$AddressCloseCurrentHandleLoadMessageOpenProc
                                                                            • String ID:
                                                                            • API String ID: 2997966233-0
                                                                            • Opcode ID: 70eea588e2ad75526fb19e70b55988c2758cf9812754a32b7b6912f8abbd8979
                                                                            • Instruction ID: c93db2572a20b8979618000732488b35826ecb450fb71b078d89515dc1591566
                                                                            • Opcode Fuzzy Hash: 70eea588e2ad75526fb19e70b55988c2758cf9812754a32b7b6912f8abbd8979
                                                                            • Instruction Fuzzy Hash: 1771B131108301AFD711EF25DC86A6FB7E4EF88718F004A2FF954922A1EB79DD458B5A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __flsbuf$__flswbuf_wctomb_s
                                                                            • String ID:
                                                                            • API String ID: 3257920507-0
                                                                            • Opcode ID: a80780f6d3cfb5cc512f32cf60f2ef12704038b25e247c4d1ee3bd03616c9039
                                                                            • Instruction ID: da33fcb1d9d57e7cea8775d4f7ccc9a3dcbf1a9a78e8e699161e1f5ee87956a7
                                                                            • Opcode Fuzzy Hash: a80780f6d3cfb5cc512f32cf60f2ef12704038b25e247c4d1ee3bd03616c9039
                                                                            • Instruction Fuzzy Hash: 86510B311056519AC7355B389D828AE37A4DF03726334460FFCA19B2D3EB2CD909C79D
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0041CF6E
                                                                            • GetFullPathNameW.KERNEL32(00000000,00000104,?,?), ref: 0041CFB1
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetLastError.KERNEL32(00000000), ref: 0041D03E
                                                                            • DeleteFileW.KERNEL32(00000000), ref: 0041D063
                                                                            • FreeLibrary.KERNEL32(00000000,00000000), ref: 0041D0B9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesDeleteErrorFreeFullLastLibraryMessageNamePath
                                                                            • String ID:
                                                                            • API String ID: 846739010-0
                                                                            • Opcode ID: dc69a096cdaf24fece12491278bcf43182e2c4d4a507db62aa0edaa6a06d8938
                                                                            • Instruction ID: 164712ab3de28c241740e73496d7fb651e5bfcc4289d1ba345ab905f4edf4b57
                                                                            • Opcode Fuzzy Hash: dc69a096cdaf24fece12491278bcf43182e2c4d4a507db62aa0edaa6a06d8938
                                                                            • Instruction Fuzzy Hash: B541C271E002146ACF11BBB5898A6EF2659AF4431DF04097BE805F32C2DB3C9D868B59
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • LoadLibraryW.KERNEL32(00000000,00000000,?,?), ref: 00431956
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004319FA
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00431A1F
                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00431A56
                                                                            • FreeLibrary.KERNEL32(?), ref: 00431A6B
                                                                              • Part of subcall function 0040DF43: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,C:\Users\user\Desktop\regsvr.exe,?,00412A47,0046BF68,?), ref: 0040DF75
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$Library$ByteCharFreeLoadMessageMultiWide
                                                                            • String ID:
                                                                            • API String ID: 3850844274-0
                                                                            • Opcode ID: 48ef30966b21c807ec1d84650b051d48fa45bfc2e08552a1b290ee8b5e4d323d
                                                                            • Instruction ID: 8bb15bf6729a8805ceeb025206d24f8ec35f406715209b04519fbfbc095bee2b
                                                                            • Opcode Fuzzy Hash: 48ef30966b21c807ec1d84650b051d48fa45bfc2e08552a1b290ee8b5e4d323d
                                                                            • Instruction Fuzzy Hash: 9F41B3316001145BDB21BB758856B6F77E1EF88328F14493BF801EB2D2DB3CA940CA5E
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • select.WS2_32(00000000,00000001,00000000,00000000,?), ref: 00426D9F
                                                                            • WSAGetLastError.WS2_32(00000000,0046BF68), ref: 00426DAA
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • __WSAFDIsSet.WSOCK32(00000000,00000001,0046BF68), ref: 00426DCE
                                                                            • _strlen.LIBCMT ref: 00426E1A
                                                                            • WSAGetLastError.WS2_32(00000000,00000000,?,?,00000000,00000000,00000001,0046BF68), ref: 00426E5B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$Message_malloc_strlenselect
                                                                            • String ID:
                                                                            • API String ID: 3938840167-0
                                                                            • Opcode ID: 7720823b9778ee6a11c4fed7c08286b44cc4873c1c6628186332208558d271a9
                                                                            • Instruction ID: 6fc1eb61393fa3f718c4f0ce45286769510ce549e345c0549498f74762c0f3a3
                                                                            • Opcode Fuzzy Hash: 7720823b9778ee6a11c4fed7c08286b44cc4873c1c6628186332208558d271a9
                                                                            • Instruction Fuzzy Hash: 35412D75A00118ABCF10ABB5DC829DF73A8AF44328F26016FF515E31C2DA7C9E408B69
                                                                            APIs
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\regsvr.exe,00000104,0048D8B0,C:\Users\user\Desktop\regsvr.exe,?,?,00406C7E,C:\Users\user\Desktop\regsvr.exe,00000104), ref: 0040C4F9
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040CE1D
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040CE37
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 0040CE57
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0040CE88
                                                                              • Part of subcall function 0040C5CD: __wcsicmp.LIBCMT ref: 0040C664
                                                                            • SHFileOperationW.SHELL32(?), ref: 0040CF3B
                                                                              • Part of subcall function 0040CC93: lstrcmpiW.KERNEL32(?,?), ref: 0040CCC8
                                                                              • Part of subcall function 0040CC93: MoveFileW.KERNEL32(?,?), ref: 0040CCFE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesMovelstrcmpi$FullNameOperationPath__wcsicmp
                                                                            • String ID:
                                                                            • API String ID: 4045721832-0
                                                                            • Opcode ID: 3c15e99f8845aa9e856b841371b6aa2ace2df06100451119d47ab2b57504b97b
                                                                            • Instruction ID: 182999012a8ff91de63184428f6aa24cf2cd3b02ddf8037012b936872ac750c8
                                                                            • Opcode Fuzzy Hash: 3c15e99f8845aa9e856b841371b6aa2ace2df06100451119d47ab2b57504b97b
                                                                            • Instruction Fuzzy Hash: 8D4120B2805219AADF10DFA4DC85ADEB3BCEF04314F5046BBE505F3181E73897898B69
                                                                            APIs
                                                                            • InterlockedIncrement.KERNEL32(00489FEC), ref: 0040F1C9
                                                                            • InterlockedDecrement.KERNEL32(00489FEC), ref: 0040F1DA
                                                                            • Sleep.KERNEL32(0000000A,?,?), ref: 0040F1E2
                                                                            • InterlockedIncrement.KERNEL32(00489FEC), ref: 0040F1E9
                                                                            • InterlockedDecrement.KERNEL32(00489FEC), ref: 0040F2D9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Interlocked$DecrementIncrement$Sleep
                                                                            • String ID:
                                                                            • API String ID: 327565842-0
                                                                            • Opcode ID: 364e6123166360e3e6a27cfc0eb2a4fde04091294220061ce0b48bd2aaef5718
                                                                            • Instruction ID: 205e7469fd3126a39f0d411cda9b039786805852db7af73936670122b79e964a
                                                                            • Opcode Fuzzy Hash: 364e6123166360e3e6a27cfc0eb2a4fde04091294220061ce0b48bd2aaef5718
                                                                            • Instruction Fuzzy Hash: A641BF32D006169BDB15DFA5DC809AE7374EB44324B09043EEE16FB291DB78AD46CBC8
                                                                            APIs
                                                                            • GetPrivateProfileSectionW.KERNEL32(00000000,?,00007FFF,?), ref: 0041EC56
                                                                            • GetPrivateProfileSectionW.KERNEL32(00000000,?,00000003,?), ref: 0041EC83
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • WritePrivateProfileSectionW.KERNEL32(00000000,?,?), ref: 0041ECC0
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0041ECE7
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0041ECF3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$SectionWrite$String$Message
                                                                            • String ID:
                                                                            • API String ID: 3956282490-0
                                                                            • Opcode ID: 3fcfe188db002073007885cdd1cf061452fdd757f93433429992a2cbc8b3bd9e
                                                                            • Instruction ID: 4b24ec794ad130bcaa36f5c59a76f3c7152512361a8e72139f8cb6cd03e45d30
                                                                            • Opcode Fuzzy Hash: 3fcfe188db002073007885cdd1cf061452fdd757f93433429992a2cbc8b3bd9e
                                                                            • Instruction Fuzzy Hash: 4431A4B2A4011C6BDB10A7B18C86EFF739DEB44308F04447BF905E7181EA7C9D858B55
                                                                            APIs
                                                                            • __lock.LIBCMT ref: 00459969
                                                                              • Part of subcall function 00455532: __mtinitlocknum.LIBCMT ref: 00455546
                                                                              • Part of subcall function 00455532: __amsg_exit.LIBCMT ref: 00455552
                                                                              • Part of subcall function 00455532: RtlEnterCriticalSection.NTDLL(?), ref: 0045555A
                                                                            • __mtinitlocknum.LIBCMT ref: 004599A9
                                                                            • __malloc_crt.LIBCMT ref: 004599EA
                                                                            • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00459A0F
                                                                            • RtlEnterCriticalSection.NTDLL(02B90EC0), ref: 00459A39
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalEnterSection__mtinitlocknum$CountCritInitSpin___crt__amsg_exit__lock__malloc_crt
                                                                            • String ID:
                                                                            • API String ID: 1486408876-0
                                                                            • Opcode ID: 70d73895f33a07e59e6e48b61447feb230db75e35a3d79a1f294adbc82ec6f41
                                                                            • Instruction ID: e18e4a73ca63e5f6fe15e1bf9427d2d9729874aef1571ea751a629393de9fb38
                                                                            • Opcode Fuzzy Hash: 70d73895f33a07e59e6e48b61447feb230db75e35a3d79a1f294adbc82ec6f41
                                                                            • Instruction Fuzzy Hash: 4631A171500B42DFC721EF99D88192AB3E4BB09316754852FE8559B3A2CB78AD09CF58
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 00401D97
                                                                            • PostMessageW.USER32(00000203,00000201,?), ref: 00401E58
                                                                            • Sleep.KERNEL32(00000000), ref: 00401E5C
                                                                            • PostMessageW.USER32(00000203,00000202,00000000), ref: 00401E69
                                                                            • Sleep.KERNEL32(00000000), ref: 00401E6D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleep$RectWindow
                                                                            • String ID:
                                                                            • API String ID: 3382505437-0
                                                                            • Opcode ID: dea5e0bc18fe0239a6eace4a88e208afe332178cffb62cb3612a46ab0661e376
                                                                            • Instruction ID: d5d84adb966cee76746330d68d9cf85862d0df582fcdf2a249f85914c926a921
                                                                            • Opcode Fuzzy Hash: dea5e0bc18fe0239a6eace4a88e208afe332178cffb62cb3612a46ab0661e376
                                                                            • Instruction Fuzzy Hash: 14318472900219EFDF10CFA9C849ADEBBB5FB44314F118666E925A72E0D7749900DF94
                                                                            APIs
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0043C204
                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,?,00000001), ref: 0043C224
                                                                            • DestroyCursor.USER32(?), ref: 0043C237
                                                                            • SendMessageW.USER32(?,00000080,00000000,?), ref: 0043C24D
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0043C27D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CursorDestroyExtractIconImageInvalidateLoadMessageRectSend
                                                                            • String ID:
                                                                            • API String ID: 3808587923-0
                                                                            • Opcode ID: 236fa9eee8e03abdb5bd8c55a9b54a2e045e0e2414d752723a7ee338e2e98434
                                                                            • Instruction ID: a8b5e9944a473fd6d0e06277b6ede5159577d967f14fe322b0be1228a56c19ff
                                                                            • Opcode Fuzzy Hash: 236fa9eee8e03abdb5bd8c55a9b54a2e045e0e2414d752723a7ee338e2e98434
                                                                            • Instruction Fuzzy Hash: D2319371900209EFDB109FA4DCC49AF3B68EB09354F10593BF911A6251D774D8A0DFAA
                                                                            APIs
                                                                            • RegEnumKeyExW.ADVAPI32 ref: 00434A8A
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00000000,00000000), ref: 00434AB6
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00434AD2
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00434AE6
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00434B0E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Enum$CloseDeleteOpen
                                                                            • String ID:
                                                                            • API String ID: 2095303065-0
                                                                            • Opcode ID: 4d40888c40cc85b33fcdefe8402ba744115cead9e61554dc255eada5bd1110b2
                                                                            • Instruction ID: 7102d85118676c44d616162e1f5937af1264a8d1d5ce79e9eae3c0c0b2501083
                                                                            • Opcode Fuzzy Hash: 4d40888c40cc85b33fcdefe8402ba744115cead9e61554dc255eada5bd1110b2
                                                                            • Instruction Fuzzy Hash: 9B214472108248BFD7019F94DC80DFBBBACEB88354F04192AF994C2151E264ED4997B6
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 00444712
                                                                            • ExtCreatePen.GDI32(?,00000001,00000000,00000000,00000000,?,?,00000000,?,?), ref: 0044474D
                                                                            • SelectObject.GDI32(?,00000000), ref: 0044475C
                                                                            • BeginPath.GDI32(?), ref: 00444773
                                                                            • SelectObject.GDI32(?,00000000), ref: 00444796
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Object$Select$BeginCreateDeletePath
                                                                            • String ID:
                                                                            • API String ID: 2338827641-0
                                                                            • Opcode ID: 42866a1c63bcb41b472d755da05abcf1cdbb9a3cd80c07c88b0d3ea84fadfffd
                                                                            • Instruction ID: f47d475fd9645cb6ac642ddefde909b459d69c0fd6f122beb06578fb717ef81d
                                                                            • Opcode Fuzzy Hash: 42866a1c63bcb41b472d755da05abcf1cdbb9a3cd80c07c88b0d3ea84fadfffd
                                                                            • Instruction Fuzzy Hash: 9121A2B1800254AFDB119FA8EC9C99E7B68F7463A4B00463FF955973A0E3745841DBA8
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 004271B1: inet_addr.WS2_32(00000000), ref: 004271C8
                                                                            • socket.WS2_32(00000002,00000001,00000006), ref: 00426F34
                                                                            • WSAGetLastError.WS2_32(00000000,?,00000000,00000000), ref: 00426F42
                                                                            • connect.WS2_32(00000000,?,00000010), ref: 00426F59
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastMessageconnectinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 2150481394-0
                                                                            • Opcode ID: 86f3be4f46347fc6956df3d0f3bf58279a4392ea0f4bf341dfe3f1f86f3986f7
                                                                            • Instruction ID: e50f3638c2835ca9518b1549c04268303d8bc3caa17dbeabc4c44a729e06525e
                                                                            • Opcode Fuzzy Hash: 86f3be4f46347fc6956df3d0f3bf58279a4392ea0f4bf341dfe3f1f86f3986f7
                                                                            • Instruction Fuzzy Hash: 4001D63170512426EF10B6766D83BBF22595F81328F46063BB915F72C2DE6C9C41466D
                                                                            APIs
                                                                            • GetDlgItem.USER32(00000000,00000008), ref: 00443A69
                                                                            • SendMessageW.USER32(00000000,00000087,00000000,00000000), ref: 00443A83
                                                                            • SendMessageW.USER32(?,00000087,00000000,00000000), ref: 00443AA5
                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00443AB3
                                                                            • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00443ABF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Item
                                                                            • String ID:
                                                                            • API String ID: 3888421826-0
                                                                            • Opcode ID: 504fdbcf548ea68ce52a1b51d364af74e53fdf7f59d053ce5375d339d91b7b18
                                                                            • Instruction ID: e27a2a24e2d8a65d927d03bdb54e24fe7ebb40e86e6863d6e49c5cd3f004b97f
                                                                            • Opcode Fuzzy Hash: 504fdbcf548ea68ce52a1b51d364af74e53fdf7f59d053ce5375d339d91b7b18
                                                                            • Instruction Fuzzy Hash: 5C0152722843487FF730AE648C85F37B699FB44B45F14062EF6C6316E0D6E66D058A68
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(?,?,?,00000000,?,0040252D,?,0000102B,?,00000000,?,00000028,00000028), ref: 00409932
                                                                            • UnmapViewOfFile.KERNEL32(?,?,00000000,?,0040252D,?,0000102B,?,00000000,?,00000028,00000028), ref: 0040994E
                                                                            • CloseHandle.KERNEL32(?,?,00000000,?,0040252D,?,0000102B,?,00000000,?,00000028,00000028), ref: 00409957
                                                                            • FreeLibrary.KERNEL32(?,?,00000000,?,0040252D,?,0000102B,?,00000000,?,00000028,00000028), ref: 00409971
                                                                            • FreeLibrary.KERNEL32(?,?,00000000,?,0040252D,?,0000102B,?,00000000,?,00000028,00000028), ref: 0040997A
                                                                              • Part of subcall function 00409AE0: LoadLibraryA.KERNEL32(kernel32.dll,0040992E,?,?,00000000,00008000,?,?,00000000,?,0040252D,?,0000102B,?,00000000,?), ref: 00409AEB
                                                                              • Part of subcall function 00409AE0: GetProcAddress.KERNEL32(00000000,VirtualFreeEx), ref: 00409AFD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$CloseFreeHandle$AddressFileLoadProcUnmapView
                                                                            • String ID:
                                                                            • API String ID: 554210777-0
                                                                            • Opcode ID: 03924327f8448f849307798e0e89cef0381649f914155a362664e2104094935c
                                                                            • Instruction ID: e9789df8bce7148182a5c14c1a3bf43569d4ae2f63334e8d3ff9a5a601a6442d
                                                                            • Opcode Fuzzy Hash: 03924327f8448f849307798e0e89cef0381649f914155a362664e2104094935c
                                                                            • Instruction Fuzzy Hash: CB01CCB1200200ABDF619F65DC84F67BBA8EF54310B1400BAF944BB392C7B4AC10CA68
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00408BF0), ref: 00409515
                                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,00408BF0), ref: 00409520
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00408BF0), ref: 00409528
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00408BF0), ref: 00409533
                                                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,00408BF0), ref: 00409569
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: 1e62e088f7e9577e17595cf97156b30afab91f5e11f9d0ca082c1a96b98f4280
                                                                            • Instruction ID: d1b350b48f29a5a9f33e23a0a91f801094cf8924d617eed79e0dfcd3da6fa2a4
                                                                            • Opcode Fuzzy Hash: 1e62e088f7e9577e17595cf97156b30afab91f5e11f9d0ca082c1a96b98f4280
                                                                            • Instruction Fuzzy Hash: 2811C272908306ABC700DF76DC45A5E7BE8AB85744F00493BF895D3291EB38D944CB5B
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 0040D67B
                                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe,?,?,?,?,?,0040126A,00000001,C:\Users\user\Desktop\regsvr.exe), ref: 0040D686
                                                                            • Sleep.KERNEL32(00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe,?,?,?,?,?,0040126A,00000001,C:\Users\user\Desktop\regsvr.exe), ref: 0040D68E
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe,?,?,?,?,?,0040126A,00000001,C:\Users\user\Desktop\regsvr.exe), ref: 0040D699
                                                                            • Sleep.KERNEL32(000000FA,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 0040D6CF
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: ceda8ae0f56a79ead81c7a89738d4a9de0b6aefbd23bd0287460a77efbc50470
                                                                            • Instruction ID: 5739e351fb4f4df6561d1e6fe6e8ff8716d84a44de3829597a49e487bb577c8b
                                                                            • Opcode Fuzzy Hash: ceda8ae0f56a79ead81c7a89738d4a9de0b6aefbd23bd0287460a77efbc50470
                                                                            • Instruction Fuzzy Hash: 6701A57191C3069BC700DFA5DC55A6E77E8AB85714F004D3EF49AD21A0EF39D1888B5B
                                                                            APIs
                                                                            • GetWindow.USER32(?,00000005), ref: 00443A07
                                                                            • SendMessageW.USER32(00000000,00000087,00000000,00000000), ref: 00443A1B
                                                                            • GetWindow.USER32(00000000,00000002), ref: 00443A28
                                                                            • IsWindow.USER32(00000000), ref: 00443A2D
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 00443A47
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CtrlMessageSend
                                                                            • String ID:
                                                                            • API String ID: 75316347-0
                                                                            • Opcode ID: 70aca144902aed48a6618e18c97ad7d93436facb27031c0c2483329a36f0c366
                                                                            • Instruction ID: afd5f69ab579939b1e469a86c5b694731c2b0b91770a2a22d8c812f2fca3b148
                                                                            • Opcode Fuzzy Hash: 70aca144902aed48a6618e18c97ad7d93436facb27031c0c2483329a36f0c366
                                                                            • Instruction Fuzzy Hash: 8801DF30244214BFE720CF09CC05F9A7BA8AF11B56F104092F045AA290E7B4AE018F9A
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 004052A5
                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 004052BC
                                                                            • MessageBeep.USER32(00000000), ref: 004052D4
                                                                            • KillTimer.USER32(?,0000040A), ref: 004052F0
                                                                            • EndDialog.USER32(?,00000001), ref: 0040530A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 3741023627-0
                                                                            • Opcode ID: 9213ddf0e7adbc55642fac758a18891736e5ab93a75b4067e21e2a58f6152ebc
                                                                            • Instruction ID: 169f5b18fe6e263734091a5834976e977de695e2cf91249a3d5d2a2b82a73339
                                                                            • Opcode Fuzzy Hash: 9213ddf0e7adbc55642fac758a18891736e5ab93a75b4067e21e2a58f6152ebc
                                                                            • Instruction Fuzzy Hash: EBF06D30500705ABEB216B25DC4DB4777B8BF00749F0005B9A282B08E1EBF5A9958F5A
                                                                            APIs
                                                                            • MoveToEx.GDI32(?,?,00000000,00000000), ref: 00444A08
                                                                            • LineTo.GDI32(?,?,?), ref: 00444A1B
                                                                            • LineTo.GDI32(?,?,?), ref: 00444A24
                                                                            • LineTo.GDI32(?,?,00000000), ref: 00444A2D
                                                                            • LineTo.GDI32(?,?,00000000), ref: 00444A36
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Line$Move
                                                                            • String ID:
                                                                            • API String ID: 3367123170-0
                                                                            • Opcode ID: 5a5300328958fecd317055f87c214d2a98c3dcf4355d41c2312cf02bfd5bf3f0
                                                                            • Instruction ID: ce0ccef848258bcd27f1560e9a3f010d27bc414eade82fd567bda08cb8c18f60
                                                                            • Opcode Fuzzy Hash: 5a5300328958fecd317055f87c214d2a98c3dcf4355d41c2312cf02bfd5bf3f0
                                                                            • Instruction Fuzzy Hash: 9EF02B3640411DBBCF126FA1EC44EAF3F7AEB4A6A0F008419FA1855020D7769521FBA6
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                            • String ID:
                                                                            • API String ID: 2625713937-0
                                                                            • Opcode ID: ef943b0b5c3f742088462ba78c201e82d5662db99151fa69d87b5260d5ee4992
                                                                            • Instruction ID: 9dd2af9711844f5e7680171cb00801f0fab9107dd6b89a414c4e08e2bd610351
                                                                            • Opcode Fuzzy Hash: ef943b0b5c3f742088462ba78c201e82d5662db99151fa69d87b5260d5ee4992
                                                                            • Instruction Fuzzy Hash: 75F01730009601AFE3228B24EC1C75E3A64FB4376AF144629E0A5891F0D7BC0555EFAE
                                                                            APIs
                                                                            • OleSetContainedObject.OLE32(?,00000001), ref: 00404A06
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ContainedObject
                                                                            • String ID: AutoIt3GUI$Container$C@
                                                                            • API String ID: 3565006973-3071952359
                                                                            • Opcode ID: 837aa742f019d13201965fe16b6af9b5aebd352aa1fae9942a2be6eae16c45c5
                                                                            • Instruction ID: fbbe80a1f547063a70e4c210cb1a1bbeb7e86a27113ecd92d13e60f33b8069d5
                                                                            • Opcode Fuzzy Hash: 837aa742f019d13201965fe16b6af9b5aebd352aa1fae9942a2be6eae16c45c5
                                                                            • Instruction Fuzzy Hash: 90817BB0600701EFDB10DFA5C88496ABBB4FF88314720896EE6469B7A1D778E941CF48
                                                                            APIs
                                                                              • Part of subcall function 004098B5: GetVersionExW.KERNEL32(?), ref: 004098DD
                                                                              • Part of subcall function 00409A50: WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000,0040250B,?,00000028,00000028), ref: 00409A7C
                                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00402E6A
                                                                              • Part of subcall function 00409A98: ReadProcessMemory.KERNEL32(?,?,?,?,00000000,0040261D,?,00000800,?,00001073,?,00000000,?,00000028,00000800), ref: 00409AC4
                                                                              • Part of subcall function 00409980: GetWindowThreadProcessId.USER32(?,?), ref: 004099B6
                                                                              • Part of subcall function 00409980: OpenProcess.KERNEL32(00000438,00000000,?,?,?,?,?,?,004024F8,00000028), ref: 004099CC
                                                                              • Part of subcall function 00409980: LoadLibraryA.KERNEL32(kernel32.dll,?,?,?,?,?,004024F8,00000028), ref: 004099E1
                                                                              • Part of subcall function 00409980: GetProcAddress.KERNEL32(00000000,VirtualAllocEx), ref: 004099F3
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00402ED0
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00402F2C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Process$MessageSend$Memory$AddressLibraryLoadOpenProcReadThreadVersionWindowWrite
                                                                            • String ID: @
                                                                            • API String ID: 3927202401-2766056989
                                                                            • Opcode ID: 6eb0afec20c121aee7cf4f96f001a8f26bdb622582b5674e1314b63c4cb0af75
                                                                            • Instruction ID: 7aea2b330923bbc924ee336288dcd8b4d17e5e0122f133b85999acd6d0602b67
                                                                            • Opcode Fuzzy Hash: 6eb0afec20c121aee7cf4f96f001a8f26bdb622582b5674e1314b63c4cb0af75
                                                                            • Instruction Fuzzy Hash: 28414E71A4011DAADB10DF64CD86FDEBBB8BB04344F0401BAE605B72C1D7B8AA44DF64
                                                                            APIs
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,0000002C), ref: 0040AE8B
                                                                            • DeleteMenu.USER32(?,?,00000000,?,000000FF,00000000,0000002C,?,0048C258,00000000), ref: 0040AED6
                                                                            • DeleteMenu.USER32(00000000,000000FF,00000000,?,0048C258,00000000), ref: 0040AF2D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$InfoItem
                                                                            • String ID: ,
                                                                            • API String ID: 135850232-3772416878
                                                                            • Opcode ID: 3de9f621674256f3343683ae04c1e7cfdfa5a888b992a10686ba2fc2e6265331
                                                                            • Instruction ID: 9cbd49a26b58c68f47048b06c05ab0f862f1573f8d9c6ff1d10a6c23aa92260a
                                                                            • Opcode Fuzzy Hash: 3de9f621674256f3343683ae04c1e7cfdfa5a888b992a10686ba2fc2e6265331
                                                                            • Instruction Fuzzy Hash: C741D171600344EFDB10CF68C884B9ABBF1AF45324F1889B9E555BB2D1C378E950CB5A
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp
                                                                            • String ID: MIDDLE$RIGHT
                                                                            • API String ID: 1389419275-498280495
                                                                            • Opcode ID: a4876e56803b382e138b89c679b87fa062f861554c741369661642b5aee36bea
                                                                            • Instruction ID: feba78a76686f9c5e6f5f32c0b2b8bf070870fe83a8c89bc30f2ba2cf74f5038
                                                                            • Opcode Fuzzy Hash: a4876e56803b382e138b89c679b87fa062f861554c741369661642b5aee36bea
                                                                            • Instruction Fuzzy Hash: B821B931A003047AEF147BB6959675EBB65AF44328F20413FF815FB2C1DB7C5A444E59
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: B
                                                                            • API String ID: 0-1255198513
                                                                            • Opcode ID: 79a2d95c895d504ba638998a31468950089ab4f78148942f58ac4c5317a871ee
                                                                            • Instruction ID: ab608e9c26b3939ee0380e514144126f237800968641f64c18a52d18837557a3
                                                                            • Opcode Fuzzy Hash: 79a2d95c895d504ba638998a31468950089ab4f78148942f58ac4c5317a871ee
                                                                            • Instruction Fuzzy Hash: DB2179B2904118DBDB116FA58C414FE77B8FB05356F500167FC10E7283D63D99098BB9
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 004403F1
                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004,?,?,?,00000001), ref: 00440405
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00440428
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window
                                                                            • String ID: SysMonthCal32
                                                                            • API String ID: 2326795674-1439706946
                                                                            • Opcode ID: 12d3946a571afb037a9288f710e20fd64ed11f9794151e192262a4d7dd858b46
                                                                            • Instruction ID: e396dd404233108e3d5a8a9871ad62dce728970a85a181b95a0f5c662251c0ec
                                                                            • Opcode Fuzzy Hash: 12d3946a571afb037a9288f710e20fd64ed11f9794151e192262a4d7dd858b46
                                                                            • Instruction Fuzzy Hash: 1D216D32500218ABEF219F95CC46BDF3BA5EF58714F100126FE14A61D0C7B99865DB99
                                                                            APIs
                                                                              • Part of subcall function 0040B52A: CloseHandle.KERNEL32(0C458D00,00000000,00406D2B,?,?,C:\Users\user\Desktop\regsvr.exe), ref: 0040B53A
                                                                            • _fseek.LIBCMT ref: 0040B3C7
                                                                            • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,00407214,00000000,?,00406D3A,?,?,?), ref: 0040B3EF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateFileHandle_fseek
                                                                            • String ID: a+b$w+b
                                                                            • API String ID: 2723389627-2501309014
                                                                            • Opcode ID: cefde1f7094c267ee786d2562a7d6c0bedf249b98274535ff4caef9c4bc4de1f
                                                                            • Instruction ID: a7674d6749f92b38cda2ed3e515cd91be9c1ec853273997140920a9cbd9850ba
                                                                            • Opcode Fuzzy Hash: cefde1f7094c267ee786d2562a7d6c0bedf249b98274535ff4caef9c4bc4de1f
                                                                            • Instruction Fuzzy Hash: 0F11D031544304BAEB201A66AC82B667798DF10398F20443FFC89B62E2D77D9D0296DD
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00440B51
                                                                            • LoadLibraryW.KERNEL32(?,?,?,0043ED2D,?,0000000B,?,?,?,?,?,00000000,00000001,0000000B,?,00000000), ref: 00440B5A
                                                                            • SendMessageW.USER32(?,00000467,00000000,?), ref: 00440B6E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$LibraryLoad
                                                                            • String ID: SysAnimate32
                                                                            • API String ID: 3205928328-1011021900
                                                                            • Opcode ID: e936329c633d813fd859bee6ff80c6bc1d3c8f284555c633437254c185f45eea
                                                                            • Instruction ID: f5e7ba30cf92359d55149b8ee9ea2def1697201481dae205e344e33dacceecda
                                                                            • Opcode Fuzzy Hash: e936329c633d813fd859bee6ff80c6bc1d3c8f284555c633437254c185f45eea
                                                                            • Instruction Fuzzy Hash: FF219372400249AFEF205FA1DC44CEB7B69EF59368B10462AFA24972A0D375DC71DB98
                                                                            APIs
                                                                            • __wcsicmp.LIBCMT ref: 00423BC1
                                                                            • __wcsicmp.LIBCMT ref: 00423BD7
                                                                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00423BEC
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$Messagemouse_event
                                                                            • String ID: DOWN
                                                                            • API String ID: 3225411779-711622031
                                                                            • Opcode ID: 1c68911598d31b5a33dbe50accacda76b5e2d0e39cc2d8e12746c70618fe303b
                                                                            • Instruction ID: 935403755a764051b4773729ef43583ed4c917042110a0a6b6437067be982d67
                                                                            • Opcode Fuzzy Hash: 1c68911598d31b5a33dbe50accacda76b5e2d0e39cc2d8e12746c70618fe303b
                                                                            • Instruction Fuzzy Hash: 2D11C3326083106AD710AE27AC4681BB7E4FFC1325F60493FF854E3281EB7CA945CA5E
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0041CD38
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF), ref: 0041CD9A
                                                                            • __swprintf.LIBCMT ref: 0041CDB3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorInformationMessageModeVolume__swprintf
                                                                            • String ID: %lu
                                                                            • API String ID: 1030839140-685833217
                                                                            • Opcode ID: 7addc1bd04a6c761da8551cdc4e1243eae1c77033e78d7082fbe24b416e8c4f2
                                                                            • Instruction ID: 519edf0266f95f1040b5d6f8bd661fd9f5dba657dcdda10d6dd64ab7fc58c87e
                                                                            • Opcode Fuzzy Hash: 7addc1bd04a6c761da8551cdc4e1243eae1c77033e78d7082fbe24b416e8c4f2
                                                                            • Instruction Fuzzy Hash: 2611C332A401086ADB14ABB1DC86EEE7778EF05308F10457BF501E7191EA78AD858B99
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,0000007F), ref: 0043ADF2
                                                                            • IsDialogMessageW.USER32(?,?), ref: 0043AE31
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClassDialogMessageName
                                                                            • String ID: AutoIt v3$AutoIt v3 GUI
                                                                            • API String ID: 682379513-3732297864
                                                                            • Opcode ID: 8db88b62852e385237969420964b99bf09304c3aff3ec132643467ca55f49cd7
                                                                            • Instruction ID: 82898b3257c513fadd93b84e6a3c1c07e75559f2299d8d4216c49e18c830bfde
                                                                            • Opcode Fuzzy Hash: 8db88b62852e385237969420964b99bf09304c3aff3ec132643467ca55f49cd7
                                                                            • Instruction Fuzzy Hash: 6421E471680205EFDB24DF64CC85B9673A8FF08308F10006AF985D3280E778ED54CB5A
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000180,00000000,00000000), ref: 00440287
                                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00440292
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,Listbox,00000000,00000000,?,?,?,?,00000001,00000001), ref: 004402B1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$MoveWindow
                                                                            • String ID: Listbox
                                                                            • API String ID: 3315199576-2633736733
                                                                            • Opcode ID: 7c87dd3917528b926471a9585c783dff56738076cc26e8f01d31b5303280606a
                                                                            • Instruction ID: 235dd332f67e8e7bb9f5e8cca9b667ab73ae0818e4ecdb380dc574b5c59b15b0
                                                                            • Opcode Fuzzy Hash: 7c87dd3917528b926471a9585c783dff56738076cc26e8f01d31b5303280606a
                                                                            • Instruction Fuzzy Hash: BA216071400209BFEF228F90DC49DEB3B69FF08358F004266FA54162A1C7BA8C75DB99
                                                                            APIs
                                                                              • Part of subcall function 00403679: SendMessageTimeoutW.USER32(0046BF68,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00403696
                                                                              • Part of subcall function 00403679: GetWindowThreadProcessId.USER32(0046BF68,00000000), ref: 004036AB
                                                                              • Part of subcall function 00403679: GetCurrentThreadId.KERNEL32 ref: 004036B2
                                                                              • Part of subcall function 00403679: AttachThreadInput.USER32(00000000,?,004034E9), ref: 004036B9
                                                                            • GetFocus.USER32 ref: 004034E9
                                                                              • Part of subcall function 004035F2: GetParent.USER32(0046BF68), ref: 00403606
                                                                            • GetClassNameW.USER32(?,?,000000FF), ref: 00403520
                                                                            • __swprintf.LIBCMT ref: 00403559
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachClassCurrentFocusInputMessageNameParentProcessSendTimeoutWindow__swprintf
                                                                            • String ID: %s%d
                                                                            • API String ID: 603989968-1110647743
                                                                            • Opcode ID: 41a02ccd1dc8662a3634fc48a5704a7047bd3ebc77357dd69716362c774484e8
                                                                            • Instruction ID: 7ee8add41c5e5001ea92f26fe6e9421db2068212b0925ad514e048e2275b69b7
                                                                            • Opcode Fuzzy Hash: 41a02ccd1dc8662a3634fc48a5704a7047bd3ebc77357dd69716362c774484e8
                                                                            • Instruction Fuzzy Hash: 84116371600304BBDB20AF759C86F6A7BECAF04345F50187AB506B2592E6B8E6418B69
                                                                            APIs
                                                                              • Part of subcall function 0040D4F7: __wcsicmp.LIBCMT ref: 0040D507
                                                                              • Part of subcall function 0040D4F7: __wcsicmp.LIBCMT ref: 0040D51C
                                                                              • Part of subcall function 0040BBB0: RegOpenKeyExW.ADVAPI32(?,?,00000000,00000001,00000000,?,?,?,0042E784,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,00000104,%.3d,?,?), ref: 0040BBCF
                                                                              • Part of subcall function 0040BBB0: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?,?,?,0042E784,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,00000104,%.3d,?,?), ref: 0040BBE6
                                                                              • Part of subcall function 0040BBB0: RegCloseKey.ADVAPI32(00000000,?,?,0042E784,80000002,SOFTWARE\Microsoft\Windows\CurrentVersion,ProgramFilesDir,00000104,%.3d,?,?,?,?,?,?,00000000), ref: 0040BBF7
                                                                            • mouse_event.USER32(00000000,00000000,00000000,00000000,00000000), ref: 0040D4C8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsicmp$CloseOpenQueryValuemouse_event
                                                                            • String ID: 1$Control Panel\Mouse$SwapMouseButtons
                                                                            • API String ID: 3324267174-1333076132
                                                                            • Opcode ID: fcbe54baa2ed6d60be1b2886f93cd982ca19cc3972aebce884271c6a35e28f4e
                                                                            • Instruction ID: b9e75c5a868c681ae09db2d0b8fe6d446da5b8c60acb4b2b9ac9a6694a8797f4
                                                                            • Opcode Fuzzy Hash: fcbe54baa2ed6d60be1b2886f93cd982ca19cc3972aebce884271c6a35e28f4e
                                                                            • Instruction Fuzzy Hash: 5E01A7A3E542147AF30056F59C47B7F71A8D7047A8F254437EA02F61C0F1FDAD85516A
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00440AAA
                                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00440ABF
                                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00440ACB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: msctls_trackbar32
                                                                            • API String ID: 3850602802-1010561917
                                                                            • Opcode ID: 2cbf69472335561da9f79780eb13cf4e1fc7ff55ee71abb4a734962abdc14c46
                                                                            • Instruction ID: b2e0d56bd2742d09350328b005db9e205b6f4aec964e4f51790b4fbdaf42cbe9
                                                                            • Opcode Fuzzy Hash: 2cbf69472335561da9f79780eb13cf4e1fc7ff55ee71abb4a734962abdc14c46
                                                                            • Instruction Fuzzy Hash: 2F118EB150030DBEEF119F608C81EEB3BA9EF1835CF114226FA14761A1D3799C619BA8
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __msize_memset_realloc
                                                                            • String ID: 9B
                                                                            • API String ID: 414201948-3820238304
                                                                            • Opcode ID: 304580f89e8a006fa01e8789d75b90b7926f9e3520f4868e305f7a1fe849fb9a
                                                                            • Instruction ID: 0503715bdfdeb782f35a997816f5d86ec743805b485debea830cc4a69dff853a
                                                                            • Opcode Fuzzy Hash: 304580f89e8a006fa01e8789d75b90b7926f9e3520f4868e305f7a1fe849fb9a
                                                                            • Instruction Fuzzy Hash: 830126766042146BDB246D76AC81D6F3B59EF80365F18413FF909832A2FD758C0481AA
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(?), ref: 004057E3
                                                                            • GetProcAddress.KERNEL32(00000000,AU3_GetPluginDetails), ref: 00405800
                                                                            • FreeLibrary.KERNEL32 ref: 0040580C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProc
                                                                            • String ID: AU3_GetPluginDetails
                                                                            • API String ID: 145871493-4132174516
                                                                            • Opcode ID: ddd309e7eca97281ce91d34f0eacb1689b24acbd29671085e02b99ab12bfb742
                                                                            • Instruction ID: d6be76e39068f4cc87866903120fb9e7b95e1e6f409fabf9c54b2125fb8f5d81
                                                                            • Opcode Fuzzy Hash: ddd309e7eca97281ce91d34f0eacb1689b24acbd29671085e02b99ab12bfb742
                                                                            • Instruction Fuzzy Hash: 0711A0B2100600EBDB248F24CC44B9B7BE8EB55361F20443EE846E32D0E6748980EB19
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __amsg_exit__calloc_crt
                                                                            • String ID: 9B
                                                                            • API String ID: 4074973159-3820238304
                                                                            • Opcode ID: 69354efe9def2decdddc32163f9ec8632fd81df85a7c1e23acfcdd1b09562a2b
                                                                            • Instruction ID: 49239f1283900d5af0c73e256226e4c143a982a057579cc64b6d6ddfa7af10d1
                                                                            • Opcode Fuzzy Hash: 69354efe9def2decdddc32163f9ec8632fd81df85a7c1e23acfcdd1b09562a2b
                                                                            • Instruction Fuzzy Hash: 11F0C2F2A04B12DBEB159A68984172673E8EB253B9F24042BF546F7381FA78DC048749
                                                                            APIs
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • GetMenuItemInfoW.USER32 ref: 0043E1DD
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0043E20A
                                                                            • DrawMenuBar.USER32 ref: 0043E216
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$InfoItem$Draw_malloc
                                                                            • String ID: ,
                                                                            • API String ID: 772068139-3772416878
                                                                            • Opcode ID: 586b6f0b87ed1859614256785061ca654babc90f4898b0eb941dacc6fd494129
                                                                            • Instruction ID: 14e73252d990092f0deb0f719bb6e20f23b0f6581c9d453d3aa7e4494cc708b1
                                                                            • Opcode Fuzzy Hash: 586b6f0b87ed1859614256785061ca654babc90f4898b0eb941dacc6fd494129
                                                                            • Instruction Fuzzy Hash: EA0180711083819FE7609F16D804B9BBBE9FF84355F10892EF9C8811A1DF759814DB56
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp
                                                                            • String ID: #notrayicon$#requireadmin
                                                                            • API String ID: 1038674560-627007125
                                                                            • Opcode ID: 36f2bb7718e39f5edead508affdf672497c6ff4cc658342ab0605053afc6932b
                                                                            • Instruction ID: 0debd8558679882e57ae2912c6de22387b45f61ec8d7045d3b8f7729d95fc824
                                                                            • Opcode Fuzzy Hash: 36f2bb7718e39f5edead508affdf672497c6ff4cc658342ab0605053afc6932b
                                                                            • Instruction Fuzzy Hash: A0E08C61A88340A4E321A6219C02B177A804B20308F10C83BAA94A01D2F3BAA414920F
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,0042243C,0048BD28,C:\Users\user\Desktop\regsvr.exe,00000000), ref: 004278FE
                                                                            • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 00427910
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: InternetCloseHandle$Wininet.dll
                                                                            • API String ID: 2574300362-2671934185
                                                                            • Opcode ID: 08f3149d8d36fd44fb1864513348ab5e65787f78489d18da61c39225afc60a84
                                                                            • Instruction ID: e57f70343dd4c56c6334594ce8c190453b758616a0c766aedd2bb5c70442515f
                                                                            • Opcode Fuzzy Hash: 08f3149d8d36fd44fb1864513348ab5e65787f78489d18da61c39225afc60a84
                                                                            • Instruction Fuzzy Hash: 53D012747047228FD7208F36E848703B7E4AB10749B90C82EE899D3361E7B8D4C0C718
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,?,?,?,?,?,?,00422654,00000000,?,80000000,?,00000000), ref: 004279FD
                                                                            • GetProcAddress.KERNEL32(00000000,FtpOpenFileW), ref: 00427A0F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: FtpOpenFileW$Wininet.dll
                                                                            • API String ID: 2574300362-1343039947
                                                                            • Opcode ID: 53a407b36a657ad3230ca38998e8dc96aa674ca352c94186afa8b4afea526ce1
                                                                            • Instruction ID: 1c6b2d396cc8cf313c3881dd2b680bb96f39c62c27d3dcf14593c4f52cea01f5
                                                                            • Opcode Fuzzy Hash: 53a407b36a657ad3230ca38998e8dc96aa674ca352c94186afa8b4afea526ce1
                                                                            • Instruction Fuzzy Hash: 77D012707447029FD720CF25E84571677E4EB54765B90C82AE859D2351E778D980CB19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,004228D4,?,20000013,?,?,00000000,00000000), ref: 00427A30
                                                                            • GetProcAddress.KERNEL32(00000000,HttpQueryInfoW), ref: 00427A42
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: HttpQueryInfoW$Wininet.dll
                                                                            • API String ID: 2574300362-1827896123
                                                                            • Opcode ID: 9f53bba96c1c1be1c18992919cd2949dca735729293c952a43a545a568b5ed63
                                                                            • Instruction ID: 60ab00e3550b917424601f743db06bbfc21b9fc7212208a0ea230d151ad99b41
                                                                            • Opcode Fuzzy Hash: 9f53bba96c1c1be1c18992919cd2949dca735729293c952a43a545a568b5ed63
                                                                            • Instruction Fuzzy Hash: E2D0C730744702CFC730CF21E808B067BE0AB00318B90C82AE899D2B60E3BCD880CB18
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0040992E,?,?,00000000,00008000,?,?,00000000,?,0040252D,?,0000102B,?,00000000,?), ref: 00409AEB
                                                                            • GetProcAddress.KERNEL32(00000000,VirtualFreeEx), ref: 00409AFD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: VirtualFreeEx$kernel32.dll
                                                                            • API String ID: 2574300362-1049216354
                                                                            • Opcode ID: 5f085c3b596ea7af617f30540299be4fa1aa7f445357cc35fc203afc14edded3
                                                                            • Instruction ID: b0843d2a3e91bbadeba752a2b0fa07e5d8402a4f88517d0cb1a798b0c6c03347
                                                                            • Opcode Fuzzy Hash: 5f085c3b596ea7af617f30540299be4fa1aa7f445357cc35fc203afc14edded3
                                                                            • Instruction Fuzzy Hash: ADD01230B007019BD720CF66D848B1277F4FB40B54B50883EE896E2791E778E880DB19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,00422E65,00000000,00000032,?,00000008), ref: 00427AC1
                                                                            • GetProcAddress.KERNEL32(00000000,InternetSetOptionW), ref: 00427AD3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: InternetSetOptionW$Wininet.dll
                                                                            • API String ID: 2574300362-1330685833
                                                                            • Opcode ID: 50e255ccd9ed52bd2b2a0b879efe487445a8dee2ad3e0532395467fc13b3f382
                                                                            • Instruction ID: 5b090d589b15056aa88f841f34ee83b4c958b36ee86c144ad9820f128b68dc83
                                                                            • Opcode Fuzzy Hash: 50e255ccd9ed52bd2b2a0b879efe487445a8dee2ad3e0532395467fc13b3f382
                                                                            • Instruction Fuzzy Hash: E9D0E2307057129FCB20DF25D84875B7AE4EB10715B90C82AA899D2751E6B8D580CB18
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,004056E6), ref: 0040577A
                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0040578C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                                            • API String ID: 2574300362-192647395
                                                                            • Opcode ID: c037bd46081226ec5a6f6ed1ec0dab98988bc471210bb2df0f891432a5e7d1cd
                                                                            • Instruction ID: 420fe3a500a39e7420e5a52ea2d8945ebf08d7ee9e20d915519dfb2d051aeb6e
                                                                            • Opcode Fuzzy Hash: c037bd46081226ec5a6f6ed1ec0dab98988bc471210bb2df0f891432a5e7d1cd
                                                                            • Instruction Fuzzy Hash: BCD01770600702CBC7209F31C8887077BE4EF00341F24C83EA89AD26A0F67880C0DA2A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(user32.dll,0043A31C), ref: 0043A8D8
                                                                            • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 0043A8EA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: MonitorFromPoint$user32.dll
                                                                            • API String ID: 2574300362-355800951
                                                                            • Opcode ID: 2b40685677c30f5f1ba40346f155b817c8fa63ab2c1a2f9a178e0a2192c71bde
                                                                            • Instruction ID: f5758fe716f7764f35791310c7bbb598c1b730625ed9026ef912be339ee3ac71
                                                                            • Opcode Fuzzy Hash: 2b40685677c30f5f1ba40346f155b817c8fa63ab2c1a2f9a178e0a2192c71bde
                                                                            • Instruction Fuzzy Hash: 01D01730540303CBC720AF71E80930676E4FF04381F20C83EA8AAD2260EAB890D0CA2A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(user32.dll,0043A329), ref: 0043A907
                                                                            • GetProcAddress.KERNEL32(00000000,GetMonitorInfoW), ref: 0043A919
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetMonitorInfoW$user32.dll
                                                                            • API String ID: 2574300362-3787768890
                                                                            • Opcode ID: 2fae2545fb0f0f17803c80b19f853822b0c64d9ae8309f722d68541239426dc6
                                                                            • Instruction ID: f8ab3e933bdad9017723fd56e0b7b8b2c73ab20a92962e0d90ef9e7f405feff4
                                                                            • Opcode Fuzzy Hash: 2fae2545fb0f0f17803c80b19f853822b0c64d9ae8309f722d68541239426dc6
                                                                            • Instruction Fuzzy Hash: F8D05E7054130ACFC7208F31C80930677E8EF08345F21CC3EE89AE2260E6B898D0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(user32.dll,00421D79), ref: 00427931
                                                                            • GetProcAddress.KERNEL32(00000000,BlockInput), ref: 00427943
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: BlockInput$user32.dll
                                                                            • API String ID: 2574300362-2937418566
                                                                            • Opcode ID: b76bede5acc9c59ba84e0cf6f11f735df99599eea85705da7afe36b04919c3bc
                                                                            • Instruction ID: 44b60320ad8f2b1a110e3cdea58c9796acdb707607bf84f5158fc73b52388c45
                                                                            • Opcode Fuzzy Hash: b76bede5acc9c59ba84e0cf6f11f735df99599eea85705da7afe36b04919c3bc
                                                                            • Instruction Fuzzy Hash: 7BD05E70645312CFD720AF31DC083077BE4AB00351B60CC3EE89AC2260E67880C0CA29
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(user32.dll,004404F2), ref: 0043A936
                                                                            • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 0043A948
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: SetLayeredWindowAttributes$user32.dll
                                                                            • API String ID: 2574300362-3673630139
                                                                            • Opcode ID: 0d756947f098a8d7ca462c92a294368173d765b65dd87a08536f26fcf6a8470d
                                                                            • Instruction ID: 2797e706a136f24d43ae82701378b70d6c8e9a85002718e55fac452cd95b25a7
                                                                            • Opcode Fuzzy Hash: 0d756947f098a8d7ca462c92a294368173d765b65dd87a08536f26fcf6a8470d
                                                                            • Instruction Fuzzy Hash: E0D05E70544307CFCB209F31C8497067BE4AF04345F21CC3EEAAAD2260EAB8C0D0DA2A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,004225AF,?,00000000,?,?,?,?,?), ref: 004279CE
                                                                            • GetProcAddress.KERNEL32(00000000,InternetConnectW), ref: 004279E0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: InternetConnectW$Wininet.dll
                                                                            • API String ID: 2574300362-1624158369
                                                                            • Opcode ID: f6e454fb2c572af5dc8a16c9929043ed5b295633bfcaaa9e9827188f536c43eb
                                                                            • Instruction ID: ae7894eb1d2c0d0b708a08299db14a306c5462dd327225007823b004d8705b2f
                                                                            • Opcode Fuzzy Hash: f6e454fb2c572af5dc8a16c9929043ed5b295633bfcaaa9e9827188f536c43eb
                                                                            • Instruction Fuzzy Hash: 3ED05E70A04703DFD7209F31D80930776E4AB00351F20CC3FE89AD2660E6B884C0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0040BCD1,75920F00,0048BA08), ref: 0040D9F4
                                                                            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0040DA06
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: CreateToolhelp32Snapshot$kernel32.dll
                                                                            • API String ID: 2574300362-2184173117
                                                                            • Opcode ID: 7484c8877aeab85a346e2eb731da51ad3ca1b1819ee2fe32edf44ac43bf59c76
                                                                            • Instruction ID: 28bd778d8b3b8fc72457058bb7913f95cc2dcda0f6b3158bf651c55d9db58da5
                                                                            • Opcode Fuzzy Hash: 7484c8877aeab85a346e2eb731da51ad3ca1b1819ee2fe32edf44ac43bf59c76
                                                                            • Instruction Fuzzy Hash: 5CD05E30A04302CFC720CF71C8487067AE4AF00741B20CC3EE896E26E0F77894C0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0040BCF1,75920F00,0048BA08), ref: 0040DA52
                                                                            • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 0040DA64
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Process32NextW$kernel32.dll
                                                                            • API String ID: 2574300362-1444338893
                                                                            • Opcode ID: 57b3287ed15c8ca71970d673d093b5f861b8d81cf0ae60c7e5c339caa40d7b06
                                                                            • Instruction ID: 9c608c4ddff85697b457ec27740170979cf90a3826af323554e570c5851ea382
                                                                            • Opcode Fuzzy Hash: 57b3287ed15c8ca71970d673d093b5f861b8d81cf0ae60c7e5c339caa40d7b06
                                                                            • Instruction Fuzzy Hash: 35D05E30B04302DFCB20CF71CC48B067AE4AB00385B20CC3EE896D26A0F77880C0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,00422B8A), ref: 00427A63
                                                                            • GetProcAddress.KERNEL32(00000000,FtpGetFileSize), ref: 00427A75
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: FtpGetFileSize$Wininet.dll
                                                                            • API String ID: 2574300362-2899565566
                                                                            • Opcode ID: aa19d241f5507953495670fe32c84c8265dfa4f59de8b289c8bf3ea2712e5869
                                                                            • Instruction ID: be39eaff734a1b21d138eed37c54e3d0039641f98ad1bfcf6a37c152186c2aa0
                                                                            • Opcode Fuzzy Hash: aa19d241f5507953495670fe32c84c8265dfa4f59de8b289c8bf3ea2712e5869
                                                                            • Instruction Fuzzy Hash: C0D05E30608702CFC720DF71D90831A77E5AB00351F20CC3EE89AD2260E6B8C0C0CA19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Psapi.dll,0040BE7D,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DA81
                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 0040DA93
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: EnumProcesses$Psapi.dll
                                                                            • API String ID: 2574300362-2142768860
                                                                            • Opcode ID: ed4f09d33d931c46da0aacd8068d9963166d8f57de016f21d98bea1b3b700ceb
                                                                            • Instruction ID: f5b7eddae680a6db0b9bdb5067001b91e79b18a25f5340ddcbe06836c19eae42
                                                                            • Opcode Fuzzy Hash: ed4f09d33d931c46da0aacd8068d9963166d8f57de016f21d98bea1b3b700ceb
                                                                            • Instruction Fuzzy Hash: 6FD06270644702DBC720DFB1C849717B6F5AB04755B11CC3BA895D1691E6789484DA15
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0040BCE1,75920F00,0048BA08), ref: 0040DA23
                                                                            • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 0040DA35
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Process32FirstW$kernel32.dll
                                                                            • API String ID: 2574300362-3009187892
                                                                            • Opcode ID: 9ce6d271d76ba9c6968771be08bc24a65401811c7ddece85b2c3ed222ced13df
                                                                            • Instruction ID: 5ded4323199b64dce0b2e52442a0e625a99a92c272301f46ed1039b54e14b8de
                                                                            • Opcode Fuzzy Hash: 9ce6d271d76ba9c6968771be08bc24a65401811c7ddece85b2c3ed222ced13df
                                                                            • Instruction Fuzzy Hash: 51D05E30A04302CFC720CFB1C9487067AE6EB14345B20CC3EF8A6D26A0F7B880C0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Psapi.dll,0040BEA3,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DADF
                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040DAF1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetModuleBaseNameW$Psapi.dll
                                                                            • API String ID: 2574300362-3411073148
                                                                            • Opcode ID: 66c654cf5cdad88c490a24c94ff5cd6865fab69cdabf375be4bd7da69510d967
                                                                            • Instruction ID: c7a7049720f05cde5cad85652193c26f7b00980f625459dad3dc74f02b97c0dc
                                                                            • Opcode Fuzzy Hash: 66c654cf5cdad88c490a24c94ff5cd6865fab69cdabf375be4bd7da69510d967
                                                                            • Instruction Fuzzy Hash: 66D012706043028FC720CF71C84831676E5AB10345B10CC7AA897E1290E6B89080DA15
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00425D80), ref: 00427AF4
                                                                            • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 00427B06
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GlobalMemoryStatusEx$kernel32.dll
                                                                            • API String ID: 2574300362-2840702992
                                                                            • Opcode ID: d0aefe17078ca4d64b212f5a88d9be9b6a24afedf4d771f8acfadd1d2418f758
                                                                            • Instruction ID: 6d1ae85a1f97f58671789afb50c503cc590da1a6aad909c8c334f9fb6de4b0bc
                                                                            • Opcode Fuzzy Hash: d0aefe17078ca4d64b212f5a88d9be9b6a24afedf4d771f8acfadd1d2418f758
                                                                            • Instruction Fuzzy Hash: 10D05E30704302CFC720CF35D80CB067AE4AB00349F20DC3EE896C2660E7B890C0CA19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,00422C85,00000000,?), ref: 00427A92
                                                                            • GetProcAddress.KERNEL32(00000000,InternetCrackUrlW), ref: 00427AA4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: InternetCrackUrlW$Wininet.dll
                                                                            • API String ID: 2574300362-347599637
                                                                            • Opcode ID: ea6788a40bef9bf8d335b074dab1fbce2954471e87f924479586483723d6aa49
                                                                            • Instruction ID: 86bf53b7e51623ac5082525813fab7f1c3c4550fe7371d9ff3988e40de5e1115
                                                                            • Opcode Fuzzy Hash: ea6788a40bef9bf8d335b074dab1fbce2954471e87f924479586483723d6aa49
                                                                            • Instruction Fuzzy Hash: 57D05E30B04702DFC720CF32D80870A76E4AB00355F20CC3EE89AC2260EBB880C0DB19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Psapi.dll,0040BE93,00000000,75920F00,0048BA08,?,0040BCA4,?,00000104,00000000,0048BA08,?,00430153,02B91720,?), ref: 0040DAB0
                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 0040DAC2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: EnumProcessModules$Psapi.dll
                                                                            • API String ID: 2574300362-751739868
                                                                            • Opcode ID: 62d1bd7b565e081a1fc4fdd261c73a2f42b1f1968a47bd22e9e630354963f29b
                                                                            • Instruction ID: 4d941873899e4c24b4f1f1ffa7c0f3f1776ab5745f5d98f4ae1e82fd9420afa3
                                                                            • Opcode Fuzzy Hash: 62d1bd7b565e081a1fc4fdd261c73a2f42b1f1968a47bd22e9e630354963f29b
                                                                            • Instruction Fuzzy Hash: ABD05E70A14302DFC720CF71C94931776E4AB40355B24DC3FE8A6E26A0F77994C0CA2A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(ICMP.DLL,00426A36,00000000,00000101,?), ref: 00427B52
                                                                            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 00427B64
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: ICMP.DLL$IcmpCloseHandle
                                                                            • API String ID: 2574300362-3530519716
                                                                            • Opcode ID: 8f28ac2006ffe70631a1253a18dc1e211e4663e54d05d9189045e5868cddcfc5
                                                                            • Instruction ID: 8672c0e0ef4863b76ebeeb2db669afa689ae5eba9539b3d2b3e0a889971e594a
                                                                            • Opcode Fuzzy Hash: 8f28ac2006ffe70631a1253a18dc1e211e4663e54d05d9189045e5868cddcfc5
                                                                            • Instruction Fuzzy Hash: DBD05E70A04302CFCB309F32D848B067AE4AF00346F20CC3EE99AC23A0E67890C0CA19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(ICMP.DLL,00426A43,00000000,00000101,?), ref: 00427B81
                                                                            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 00427B93
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: ICMP.DLL$IcmpSendEcho
                                                                            • API String ID: 2574300362-58917771
                                                                            • Opcode ID: 84bed99754387deee0e680a7c2f3272997de1789183039d9230deaba62afea0d
                                                                            • Instruction ID: 1d4d99d6db18da3650d726b166d65afd412cb1229f349dbb20e9186e86b4f61f
                                                                            • Opcode Fuzzy Hash: 84bed99754387deee0e680a7c2f3272997de1789183039d9230deaba62afea0d
                                                                            • Instruction Fuzzy Hash: D2D05E30605702CFD720AF31DC087077AE4AB00346B20CC3EE8AAC22A2E678A0C0CA19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(ICMP.DLL,004269A5), ref: 00427B23
                                                                            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00427B35
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: ICMP.DLL$IcmpCreateFile
                                                                            • API String ID: 2574300362-275556492
                                                                            • Opcode ID: b4ad487a783e1d7bfb1656269052bf99816fe8d5d499e873bae820f25298bd5b
                                                                            • Instruction ID: 57ba0db0c0d9935087a62fbc16d5e5fb205244368b1ae8c3228f67b5f4ce217b
                                                                            • Opcode Fuzzy Hash: b4ad487a783e1d7bfb1656269052bf99816fe8d5d499e873bae820f25298bd5b
                                                                            • Instruction Fuzzy Hash: 5AD05E70604302DFC7209F31D908706BAE5EB10345B20CC3FE8AAC22A0E67890C0CB19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(shell32.dll,0041DA63), ref: 0041ED71
                                                                            • GetProcAddress.KERNEL32(00000000,SHEmptyRecycleBinW), ref: 0041ED83
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: SHEmptyRecycleBinW$shell32.dll
                                                                            • API String ID: 2574300362-2648762502
                                                                            • Opcode ID: 1194797544239af703dbc6869210b20b5af27adae2b74ff9f78b483b034ae112
                                                                            • Instruction ID: 1b9d0de806687f87f538c486bf067965bab02528b0a7e7b19d20469b5d123dcc
                                                                            • Opcode Fuzzy Hash: 1194797544239af703dbc6869210b20b5af27adae2b74ff9f78b483b034ae112
                                                                            • Instruction Fuzzy Hash: A2D05E30540302CFC7209F32E808B07BAE4BF00345B20CC3EEC96C22A0F67890C0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Psapi.dll,004305B9), ref: 00433D87
                                                                            • GetProcAddress.KERNEL32(00000000,GetProcessMemoryInfo), ref: 00433D99
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetProcessMemoryInfo$Psapi.dll
                                                                            • API String ID: 2574300362-1709866170
                                                                            • Opcode ID: 6a74eff8254b013d3a5c1ba8e89bd335f6a75ad96a0e3801fa0a854c6f297c07
                                                                            • Instruction ID: 43160a7b4c6c75c0376d90d86c873bb56eda1254c813ee9b55ecc445635d0d7f
                                                                            • Opcode Fuzzy Hash: 6a74eff8254b013d3a5c1ba8e89bd335f6a75ad96a0e3801fa0a854c6f297c07
                                                                            • Instruction Fuzzy Hash: 6AD05E70540302CFC7208F32C94970677E4AB54352F20DC3FE896D2260F77894D0CA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0041C9E4,00000000), ref: 0041ED13
                                                                            • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExW), ref: 0041ED25
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetDiskFreeSpaceExW$kernel32.dll
                                                                            • API String ID: 2574300362-1127948838
                                                                            • Opcode ID: f782902c30e3ae857e0f025aa73a9f6c815e808367de765f87b4b3c3da234145
                                                                            • Instruction ID: c82ea21f10f30a4f7c59a10dd8345c001258c3e4705128159ccbf0c67bc6cc17
                                                                            • Opcode Fuzzy Hash: f782902c30e3ae857e0f025aa73a9f6c815e808367de765f87b4b3c3da234145
                                                                            • Instruction Fuzzy Hash: A7D0173450030B8BD7208F32D90870677E5EB04345B21C83EAC96C2660E67890C0DA1A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0041CFEA), ref: 0041ED42
                                                                            • GetProcAddress.KERNEL32(00000000,CreateHardLinkW), ref: 0041ED54
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: CreateHardLinkW$kernel32.dll
                                                                            • API String ID: 2574300362-294928789
                                                                            • Opcode ID: 6b20ecf0885143366b6c71dba4e8d0c9d16a3201abb07122433001394a88abd7
                                                                            • Instruction ID: 085399678d84b1d6def0fa271d9c99049f470565a0e7db38c4bdfa974ff0378f
                                                                            • Opcode Fuzzy Hash: 6b20ecf0885143366b6c71dba4e8d0c9d16a3201abb07122433001394a88abd7
                                                                            • Instruction Fuzzy Hash: 89D017305403028BC7208F32D808B0777E5AF00381B20C83EAC96C26A0E67880C0CA2A
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Advapi32.dll), ref: 00433DE5
                                                                            • GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW), ref: 00433DF7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Advapi32.dll$CreateProcessWithLogonW
                                                                            • API String ID: 2574300362-755999451
                                                                            • Opcode ID: 611f8aec9c8c5d8bb75f4fcc9120e60d7c1ce9bf5a36164a453839588168c94a
                                                                            • Instruction ID: 37d9f696a655c4c479ff660416ab556ffa549eb04b7ad0110d5eb857d8c0101d
                                                                            • Opcode Fuzzy Hash: 611f8aec9c8c5d8bb75f4fcc9120e60d7c1ce9bf5a36164a453839588168c94a
                                                                            • Instruction Fuzzy Hash: 86D01730900302CBC7208F76CC0A7177AE5AB14342F20C82AA89AC2660E678A580CA19
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,0043048B), ref: 00433DB6
                                                                            • GetProcAddress.KERNEL32(00000000,GetProcessIoCounters), ref: 00433DC8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetProcessIoCounters$kernel32.dll
                                                                            • API String ID: 2574300362-999795910
                                                                            • Opcode ID: 339b3c5f490e09a691900cc8c828b822bdf1fe214bf33dd18b5a22b8d67d0cb5
                                                                            • Instruction ID: 8b407ad04e4463e96094e744a46e4a5cab361105b8cf8a3ef54501a4b6c9d52c
                                                                            • Opcode Fuzzy Hash: 339b3c5f490e09a691900cc8c828b822bdf1fe214bf33dd18b5a22b8d67d0cb5
                                                                            • Instruction Fuzzy Hash: CED067706007029BDB609F75C84970677E4EF04786F21D82EE896D2AA0F678A5C0DA19
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(KERNEL32,00453EB1), ref: 0045FB46
                                                                            • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0045FB56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                            • API String ID: 1646373207-3105848591
                                                                            • Opcode ID: a49159cfade4896ca8724ffbfadfc9e740a769a311552b960f07c313dbd1b2d4
                                                                            • Instruction ID: d4c83df978edc4f065066c0197f2b1cc833cf3d5380d2a43b66dc6ebbdcb50df
                                                                            • Opcode Fuzzy Hash: a49159cfade4896ca8724ffbfadfc9e740a769a311552b960f07c313dbd1b2d4
                                                                            • Instruction Fuzzy Hash: DFC01220B88202E6EA115BB18C2DF1622482B00B03F180033AC01E0282FA9CE228E92F
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(kernel32.dll,004010C0,?), ref: 0040E2BA
                                                                            • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 0040E2CA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: IsDebuggerPresent$kernel32.dll
                                                                            • API String ID: 1646373207-2078679533
                                                                            • Opcode ID: 49cf6bddfaafe507273fb610119f6577bf241112a089293395c58fc312205660
                                                                            • Instruction ID: da9fff722c5815cfe112fee6522940994cee320bcfdf9fc481dd776cbae943e8
                                                                            • Opcode Fuzzy Hash: 49cf6bddfaafe507273fb610119f6577bf241112a089293395c58fc312205660
                                                                            • Instruction Fuzzy Hash: 9CC04C6074C30157EB246FB25C49B573A9D7940B45358487BA941E16D1FFB8C450952F
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(Wininet.dll,?,?,004224A7), ref: 004279A7
                                                                            • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 004279B9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: InternetReadFile$Wininet.dll
                                                                            • API String ID: 2574300362-924813344
                                                                            • Opcode ID: ec1d8329e6142224069133f776555a6525cbb6d559760011276ece81c92f1949
                                                                            • Instruction ID: 4dfd4e6fa34d17f2a4052412c2b5b122fcf7795a42c1a7ba1782321997c02822
                                                                            • Opcode Fuzzy Hash: ec1d8329e6142224069133f776555a6525cbb6d559760011276ece81c92f1949
                                                                            • Instruction Fuzzy Hash: 30D0C9F0706702DEDB204F21D8087437AE4AF44B09F60C82EF899D1251E7B884C0DA19
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _malloc$_strcat_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 3340056812-0
                                                                            • Opcode ID: 82e27eac208524e84b849519619e38b2b28ffcd29e890681b842ab6b32e0aef4
                                                                            • Instruction ID: 545718dd6d3eb59869aef27a5fd983a10283a723f38f0facfefcd2d3d8c06f9e
                                                                            • Opcode Fuzzy Hash: 82e27eac208524e84b849519619e38b2b28ffcd29e890681b842ab6b32e0aef4
                                                                            • Instruction Fuzzy Hash: D4514074B142449BCB04EF7594819AAB3A1EF48329B10553FF816EB792DB3CE944CF49
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000004,?), ref: 00402C30
                                                                            • __itoa.LIBCMT ref: 00402C62
                                                                              • Part of subcall function 00402A8A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00402AF8
                                                                            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00402CD3
                                                                            • __itoa.LIBCMT ref: 00402D2C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$__itoa
                                                                            • String ID:
                                                                            • API String ID: 1034417225-0
                                                                            • Opcode ID: 6479adf1d464423e06f06b4b2c1064078296a0e095f77806e5d8418aa2d08842
                                                                            • Instruction ID: f21ff541d15882a80bdd26e4922d95dc45ac5a5ef2a736d9e174221dac97fa04
                                                                            • Opcode Fuzzy Hash: 6479adf1d464423e06f06b4b2c1064078296a0e095f77806e5d8418aa2d08842
                                                                            • Instruction Fuzzy Hash: 89418D31A00219ABEF10AF56CC45BDE7B74EF04308F00442AF904B72D1DBB8AE548B99
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,0046BF68,00000000,?,?,?,?,?,0042990A,00000000,00000001,NULL Pointer assignment,00000001,?,0046BF68,00000000), ref: 004284FA
                                                                            • VariantCopy.OLEAUT32(?,0042990A), ref: 00428545
                                                                            • VariantCopy.OLEAUT32(?,00000008), ref: 0042855A
                                                                            • VariantCopy.OLEAUT32(?,00000008), ref: 0042856F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CopyVariant$ErrorLast
                                                                            • String ID:
                                                                            • API String ID: 2286883814-0
                                                                            • Opcode ID: c095161b3c3eca1da13a5db254ed57251c27e5cd8a724a4257930d794c638cfe
                                                                            • Instruction ID: 8cf9b7f0eae6392f00d0b55afd495f1606c12864f6b5e59e74c38ae41be95c8a
                                                                            • Opcode Fuzzy Hash: c095161b3c3eca1da13a5db254ed57251c27e5cd8a724a4257930d794c638cfe
                                                                            • Instruction Fuzzy Hash: F3416071601219AFCB00DF69D885AEEB7B4FF48304F54416FE40597321DB78A990CB99
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 0043D7D3
                                                                            • InvalidateRect.USER32(?,00000000,00000000), ref: 0043D83A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$InvalidateWindow
                                                                            • String ID:
                                                                            • API String ID: 2377233956-0
                                                                            • Opcode ID: 0b84d6a4fdc5eddc79ad7f804bf8f833126f0093fdb90673e781d4869b4b077e
                                                                            • Instruction ID: e273a0cc10c76d77dfc785e0b16cc78f071781885517d2caa0eb69e1639e6bd8
                                                                            • Opcode Fuzzy Hash: 0b84d6a4fdc5eddc79ad7f804bf8f833126f0093fdb90673e781d4869b4b077e
                                                                            • Instruction Fuzzy Hash: A3418271E00605EFDF28EF64E880AAEB7B1BF48314F10566AE961A7250D374BD60CB59
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CursorDeleteDestroyObject
                                                                            • String ID:
                                                                            • API String ID: 1476932828-0
                                                                            • Opcode ID: d827a9a6a5ef61c03da4cd5de3216072c1900717e694b6c871e29928bc81ee2a
                                                                            • Instruction ID: f8350339b93945bbf5ca816c8f63d24256579e2598d33d114b21afe132fca540
                                                                            • Opcode Fuzzy Hash: d827a9a6a5ef61c03da4cd5de3216072c1900717e694b6c871e29928bc81ee2a
                                                                            • Instruction Fuzzy Hash: 2D418F35600345DBDB249F69DCC8A2A73B8EB0E314F18642BE905E7352D778E840DF6A
                                                                            APIs
                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0046100A
                                                                            • __isleadbyte_l.LIBCMT ref: 0046103E
                                                                            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,A045FF98,?,00000000,?,?,?,0045A20C,?,?,00000002), ref: 0046106F
                                                                            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,?,00000000,?,?,?,0045A20C,?,?,00000002), ref: 004610DD
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                            • String ID:
                                                                            • API String ID: 3058430110-0
                                                                            • Opcode ID: e28c209b323841a4df19f396737b8bd8f1a375e92dc0d940a87a02ad87e6c617
                                                                            • Instruction ID: e90498c06a421d08c173bb6830835a9890051fd003bfad16de7ce8be1aabad97
                                                                            • Opcode Fuzzy Hash: e28c209b323841a4df19f396737b8bd8f1a375e92dc0d940a87a02ad87e6c617
                                                                            • Instruction Fuzzy Hash: 69319331A04285EFDF20DF64C840AAE7BB4BF01355F1885ABE4508B6A5F735D980DB5A
                                                                            APIs
                                                                            • BeginPaint.USER32(?,?,0048A010,?,?), ref: 00443F11
                                                                            • SetViewportOrgEx.GDI32(?,?,?,00000000), ref: 00443F71
                                                                            • Rectangle.GDI32(?,00000000,00000000,?,?), ref: 00443FBC
                                                                            • EndPaint.USER32(?,?,?,?,00000000,00000000,?,?,?,?,00000000,?,?), ref: 0044400F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Paint$BeginRectangleViewport
                                                                            • String ID:
                                                                            • API String ID: 1204901048-0
                                                                            • Opcode ID: 161c840d6323463e4be95f6d8e2924c974c8fc9d42331a84e691006ef1c6bfff
                                                                            • Instruction ID: bea841b065eb83fee81ec24a1a64a5fce1f1c64dce503faa51bae763fb5dbe24
                                                                            • Opcode Fuzzy Hash: 161c840d6323463e4be95f6d8e2924c974c8fc9d42331a84e691006ef1c6bfff
                                                                            • Instruction Fuzzy Hash: 3431FA30D00214AFEB119F14DC85BAEBBB4EF00725F10466AF9519B2A1D3789D45DB58
                                                                            APIs
                                                                            • ClientToScreen.USER32(?,?), ref: 0043B539
                                                                            • GetWindowRect.USER32(00000003,?), ref: 0043B586
                                                                            • PtInRect.USER32(?,0048A060,000000FF), ref: 0043B596
                                                                            • MessageBeep.USER32(00000000), ref: 0043B604
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 1352109105-0
                                                                            • Opcode ID: df27d74fd1adc3461149a3bb43d0c56fa8171d90bdffc4a29afb3a98d7d18a64
                                                                            • Instruction ID: 12492d7e1148cac61e3e525d5cf99d49772068cf899de8fc26f14cdbc9f9d409
                                                                            • Opcode Fuzzy Hash: df27d74fd1adc3461149a3bb43d0c56fa8171d90bdffc4a29afb3a98d7d18a64
                                                                            • Instruction Fuzzy Hash: 12313E31900209EFDB20CF59C445B9EBBF4EF09318F14559AD521E6290D778DE44CF96
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00408E45
                                                                            • GetKeyboardState.USER32(?), ref: 00408E82
                                                                            • SetKeyboardState.USER32(00000080), ref: 00408E97
                                                                            • PostMessageW.USER32(?,00000100,00000011,00000000), ref: 00408F00
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$MessagePostVirtual
                                                                            • String ID:
                                                                            • API String ID: 863366817-0
                                                                            • Opcode ID: 2efead515a75791721b07f3c0dd1f57b2857987c3408928a358ee1463599cf4b
                                                                            • Instruction ID: 846ba6a3f039adf3d8e89b73ddfd1cffcf3a589b14685dac6fc388346d85dbcd
                                                                            • Opcode Fuzzy Hash: 2efead515a75791721b07f3c0dd1f57b2857987c3408928a358ee1463599cf4b
                                                                            • Instruction Fuzzy Hash: F721F9716002116ADB305629CE88BBB3A1A9BD1350F45413FE9C5B72C6CE7C4C8697AE
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00408F4F
                                                                            • GetKeyboardState.USER32(?), ref: 00408F8C
                                                                            • PostMessageW.USER32(?,00000101,00000011,00000000), ref: 00408FF6
                                                                            • SetKeyboardState.USER32(?), ref: 0040900D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$MessagePostVirtual
                                                                            • String ID:
                                                                            • API String ID: 863366817-0
                                                                            • Opcode ID: a87427e843264fe2b0c4c711e1774dbe50c5a869ebea08ce98c37f31ca4bd9c9
                                                                            • Instruction ID: e4fa19226f6e752cab38e5f3bae3713b1f58b2b6ccc06d6c61f689ad8759ce09
                                                                            • Opcode Fuzzy Hash: a87427e843264fe2b0c4c711e1774dbe50c5a869ebea08ce98c37f31ca4bd9c9
                                                                            • Instruction Fuzzy Hash: 6321047050021666EB305A398DCCBE77B1DDB91394F15003BF995762D2CBBD9CC2866E
                                                                            APIs
                                                                            • DeleteObject.GDI32(?), ref: 0043DBF6
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000002,000000FF,000000FF,000000FF,00000001,00000004,00000000,00000002,00000000,?), ref: 0043DC4F
                                                                            • SendMessageW.USER32(00000001,00000030,00000000,00000001), ref: 0043DC5F
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0043DC87
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDeleteFontMessageMoveObjectSendWindow
                                                                            • String ID:
                                                                            • API String ID: 2991177864-0
                                                                            • Opcode ID: b5c01f5b47ffe5de0817ca0eeae40f95bcbab405e62c41bbfbe0495c62b4bd7f
                                                                            • Instruction ID: 07e63a0842e90d72c6378ef92484882758498f76492fe4b417677636f71defd8
                                                                            • Opcode Fuzzy Hash: b5c01f5b47ffe5de0817ca0eeae40f95bcbab405e62c41bbfbe0495c62b4bd7f
                                                                            • Instruction Fuzzy Hash: B62160B2900615BFE7109FA4DD85EAB7BACFB08759F005061FA01E6251D3B4AD50CBA4
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00404296
                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 004042C0
                                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004042F1
                                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,0040428D,?,?), ref: 0040431F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow
                                                                            • String ID:
                                                                            • API String ID: 2796087071-0
                                                                            • Opcode ID: 0484ec8d16b13a90b4ffddea9f75362cb7d762c0d69b827cde1be4c97e2fceae
                                                                            • Instruction ID: 3c7eb31f239e9aa073aa41912094c3fd81cfa18c72bffc806f03ab11c83ef897
                                                                            • Opcode Fuzzy Hash: 0484ec8d16b13a90b4ffddea9f75362cb7d762c0d69b827cde1be4c97e2fceae
                                                                            • Instruction Fuzzy Hash: FA110C732082006BF321562A9C46F3BBBD8EBC5724F00457EFA45A61C0EBBDEC018269
                                                                            APIs
                                                                              • Part of subcall function 0040258A: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00402595
                                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00402677
                                                                            • __itoa.LIBCMT ref: 00402690
                                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004026B4
                                                                            • __itoa.LIBCMT ref: 004026C5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$__itoa
                                                                            • String ID:
                                                                            • API String ID: 1034417225-0
                                                                            • Opcode ID: 6a40701b820029ecc14d76a7a248d3be8f9a622ee1221965fe71c1ff7d743af8
                                                                            • Instruction ID: 9d3434ac819a1789471cb966a4969bcd22a4ac27912ccf311385d9082d1b4278
                                                                            • Opcode Fuzzy Hash: 6a40701b820029ecc14d76a7a248d3be8f9a622ee1221965fe71c1ff7d743af8
                                                                            • Instruction Fuzzy Hash: 16119A71740204F6EB10AF658D4AF9E76A8AB44704F10483FF401F51C2E6FD99419B5E
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                            • select.WS2_32(00000000,00000001,00000000,00000000,?), ref: 004270AB
                                                                            • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000,00000001,00000000,00000000,?), ref: 004270C5
                                                                            • accept.WS2_32(00000000,00000000,00000000), ref: 004270D5
                                                                            • WSAGetLastError.WS2_32(00000000,00000000,00000001,00000000,00000000,?), ref: 004270DE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastMessageacceptselect
                                                                            • String ID:
                                                                            • API String ID: 927852018-0
                                                                            • Opcode ID: 15611bfc40393262dce4c6815501722a3b919f04e4572bde013085f841e8f58c
                                                                            • Instruction ID: 4a93a70d94b3a64b85d847650a267a25dbaed4962d4b96a3fbd1506a1dcc8b61
                                                                            • Opcode Fuzzy Hash: 15611bfc40393262dce4c6815501722a3b919f04e4572bde013085f841e8f58c
                                                                            • Instruction Fuzzy Hash: DB11A5717011287BDB10AB7A9CC1AEFB7ECEB45314F14467FB406E3281DA789D848AA4
                                                                            APIs
                                                                            • MoveToEx.GDI32(?,00000000,?,00000000), ref: 004447DB
                                                                            • PolyBezierTo.GDI32(?,?,00000003), ref: 004447E9
                                                                            • LineTo.GDI32(?,?,?), ref: 004447FE
                                                                            • LineTo.GDI32(?,00000000,FFFFFFFE), ref: 00444814
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Line$BezierMovePoly
                                                                            • String ID:
                                                                            • API String ID: 2412604778-0
                                                                            • Opcode ID: 8180a25d0f59ff2bf34a29dcdb8acd7184fe83524d7c551337ba7c685310def3
                                                                            • Instruction ID: 26e671d2fb9994fe77682ce7daed9aa180b1dbddb93ceb7be767603ea44d3bb3
                                                                            • Opcode Fuzzy Hash: 8180a25d0f59ff2bf34a29dcdb8acd7184fe83524d7c551337ba7c685310def3
                                                                            • Instruction Fuzzy Hash: E1110234900248FFEB219F58CC45BAB7BA9FF86718F014027FC8692211D3719D92CA78
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _logf$LineMove
                                                                            • String ID:
                                                                            • API String ID: 2044247434-0
                                                                            • Opcode ID: 7fca5595933b04d3a60d265ffe6383e849402ff69cd5472964a68a6aa2686c9c
                                                                            • Instruction ID: c5a76681743adf7b999c69aec59ad5da20a20ac75821f7948237001747c6a2e2
                                                                            • Opcode Fuzzy Hash: 7fca5595933b04d3a60d265ffe6383e849402ff69cd5472964a68a6aa2686c9c
                                                                            • Instruction Fuzzy Hash: 7921477290010AEFCB00AFA1EE099EE7B78FF04340F118569F845721A5DB348A70DB69
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 0040C097
                                                                            • MessageBoxW.USER32(00000000,?,?,?), ref: 0040C0C7
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0040C0DC
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040C0E3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                            • String ID:
                                                                            • API String ID: 2880819207-0
                                                                            • Opcode ID: 3a461b0a7849f15d0c7a53f1f1889f95dc2c4b60ad5dc55d7191b71920de2b1c
                                                                            • Instruction ID: 68dee4e087d7114d11a20b65234cd4f7eaa897139ced1b4c656305c233959341
                                                                            • Opcode Fuzzy Hash: 3a461b0a7849f15d0c7a53f1f1889f95dc2c4b60ad5dc55d7191b71920de2b1c
                                                                            • Instruction Fuzzy Hash: F601F572804114FFC7015BE99D848EE7FADA705324B1442B7F510F2291E6754D4597AA
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040C264
                                                                            • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0040C295
                                                                            • SetFileTime.KERNEL32(00000000,00000000,?,00000000), ref: 0040C2C3
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040C2CA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesCloseCreateHandleTime
                                                                            • String ID:
                                                                            • API String ID: 1550419386-0
                                                                            • Opcode ID: 3a47ade6f643f18aeff63981d1103ae7d47e3b78f763486892427656c65242d1
                                                                            • Instruction ID: e8b550afd85c3f92e44463ecb0f1c11cf1d601401178d23c8b88205d791c1f0e
                                                                            • Opcode Fuzzy Hash: 3a47ade6f643f18aeff63981d1103ae7d47e3b78f763486892427656c65242d1
                                                                            • Instruction Fuzzy Hash: AD017175805208FEEF101FA09CD4DAB3B1DDB16368F0043BAFE25356E093754D56A65A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                            • String ID:
                                                                            • API String ID: 3016257755-0
                                                                            • Opcode ID: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
                                                                            • Instruction ID: e69f371f74b045fbb5152984c990a52b04f961167a31e77fc91c2833b4590bea
                                                                            • Opcode Fuzzy Hash: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
                                                                            • Instruction Fuzzy Hash: 9D01433244014EBBCF125E84DC41CEE3F22BB5C355B548426FE2854632C73AC9BAAB87
                                                                            APIs
                                                                              • Part of subcall function 00454BF1: __amsg_exit.LIBCMT ref: 00454BFF
                                                                            • __amsg_exit.LIBCMT ref: 00454135
                                                                            • __lock.LIBCMT ref: 00454145
                                                                            • InterlockedDecrement.KERNEL32(?), ref: 00454162
                                                                            • InterlockedIncrement.KERNEL32(02B92BF0), ref: 0045418D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                                                            • String ID:
                                                                            • API String ID: 4129207761-0
                                                                            • Opcode ID: 96ddec8bdd3c8fdb330c801833a2aeb365393931cc23dce57864f3d017f1591d
                                                                            • Instruction ID: 7a10f278f3360717a59da4e6f89b8b30e491ddfa78837879bdc38dcac40a551e
                                                                            • Opcode Fuzzy Hash: 96ddec8bdd3c8fdb330c801833a2aeb365393931cc23dce57864f3d017f1591d
                                                                            • Instruction Fuzzy Hash: E601A131901E11A7C721AF66950979E77A4AF5471EF15401BEC086B283C72CA9CDCBDE
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00080000,00000001,00000000,50000000,?,?,?,?,00000001,?,00000000,?), ref: 0043F457
                                                                            • GetStockObject.GDI32(00000011), ref: 0043F46B
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 0043F475
                                                                            • ShowWindow.USER32(00000000,00000000,?,004401C0,?,Combobox,00000000,00000000,?,?,?,?,00000001,00000001,00000001,?), ref: 0043F48D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateMessageObjectSendShowStock
                                                                            • String ID:
                                                                            • API String ID: 1358664141-0
                                                                            • Opcode ID: 87f90f506f80229ffa487107e05a684201f86a3185b7b634859c0de397f7ab3e
                                                                            • Instruction ID: 3a465f91b8be0505d5efdc3511d5f644b8a29406f0e90bc2eb619e2c7ab6860b
                                                                            • Opcode Fuzzy Hash: 87f90f506f80229ffa487107e05a684201f86a3185b7b634859c0de397f7ab3e
                                                                            • Instruction Fuzzy Hash: 07018C72100248BFDF128FA0DC44AEB3F6AFB69358F04403AFA1550220D77688A9EF65
                                                                            APIs
                                                                            • __setmode.LIBCMT ref: 0040D93A
                                                                              • Part of subcall function 0040DF43: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,C:\Users\user\Desktop\regsvr.exe,?,00412A47,0046BF68,?), ref: 0040DF75
                                                                            • _fprintf.LIBCMT ref: 0040D956
                                                                              • Part of subcall function 00452D03: _flsall.LIBCMT ref: 00452D17
                                                                            • __setmode.LIBCMT ref: 0040D982
                                                                            • OutputDebugStringW.KERNEL32(?), ref: 0040D992
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __setmode$ByteCharDebugMultiOutputStringWide_flsall_fprintf
                                                                            • String ID:
                                                                            • API String ID: 3988768035-0
                                                                            • Opcode ID: 5e48517a55ca6455bfa4997ce195b5a66a69f7560ea1ee26a8a09b58379adce5
                                                                            • Instruction ID: 05e0aeb41481562ac6117dfac6535399c9c862da8d9b7532ddae16f5081f6c67
                                                                            • Opcode Fuzzy Hash: 5e48517a55ca6455bfa4997ce195b5a66a69f7560ea1ee26a8a09b58379adce5
                                                                            • Instruction Fuzzy Hash: 45F072B28012007ADB2177F2AD07DAF37689F03738B20021FF810312D2EABD0E49522E
                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,00000000,00455081,0044EB47,00000001,004548D9,?,00000000,?,?,?,?,004549EB,?,0045321E), ref: 00454B7C
                                                                              • Part of subcall function 00454A33: TlsGetValue.KERNEL32(?,0045321E), ref: 00454A3A
                                                                              • Part of subcall function 00454A33: TlsSetValue.KERNEL32(00000000,0045321E), ref: 00454A5B
                                                                            • __calloc_crt.LIBCMT ref: 00454B9E
                                                                              • Part of subcall function 00456F77: __calloc_impl.LIBCMT ref: 00456F85
                                                                              • Part of subcall function 00456F77: Sleep.KERNEL32(00000000), ref: 00456F9C
                                                                              • Part of subcall function 004549A1: TlsGetValue.KERNEL32(00000000,00454A51,?,0045321E), ref: 004549AE
                                                                              • Part of subcall function 004549A1: TlsGetValue.KERNEL32(00000006,?,0045321E), ref: 004549C5
                                                                              • Part of subcall function 00454ABB: GetModuleHandleA.KERNEL32(KERNEL32.DLL,00472810,0000000C,00454BCC,00000000,00000000,?,00000000,00455081,0044EB47,00000001,004548D9,?,00000000), ref: 00454ACC
                                                                              • Part of subcall function 00454ABB: GetProcAddress.KERNEL32(?,EncodePointer), ref: 00454B00
                                                                              • Part of subcall function 00454ABB: GetProcAddress.KERNEL32(?,DecodePointer), ref: 00454B10
                                                                              • Part of subcall function 00454ABB: InterlockedIncrement.KERNEL32(004763A0), ref: 00454B32
                                                                              • Part of subcall function 00454ABB: __lock.LIBCMT ref: 00454B3A
                                                                              • Part of subcall function 00454ABB: ___addlocaleref.LIBCMT ref: 00454B59
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00454BCE
                                                                            • SetLastError.KERNEL32(00000000,?,00000000,00455081,0044EB47,00000001,004548D9,?,00000000,?,?,?,?,004549EB,?,0045321E), ref: 00454BE6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                                                            • String ID:
                                                                            • API String ID: 1081334783-0
                                                                            • Opcode ID: 76f2c9e9e10b3fd07110aad584e70e93fe066cd141669d6c9e81ab780a7224e1
                                                                            • Instruction ID: f90536dda774121e1838ea8d487922f48e0d3b9865d9ec0748d05121e01be638
                                                                            • Opcode Fuzzy Hash: 76f2c9e9e10b3fd07110aad584e70e93fe066cd141669d6c9e81ab780a7224e1
                                                                            • Instruction Fuzzy Hash: ABF02D325496115BC23237B56C09B5B3A649F8077A711012FFC049D1D2DF28D9C5829D
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 0043AC65
                                                                            • ScreenToClient.USER32(000000FF,?), ref: 0043AC83
                                                                            • ScreenToClient.USER32(000000FF,?), ref: 0043ACA3
                                                                            • InvalidateRect.USER32(000000FF,?,?), ref: 0043ACBA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                                            • String ID:
                                                                            • API String ID: 357397906-0
                                                                            • Opcode ID: d797fe73337c4e2eb4fb2508b6ab0c4692f88574a12d919575ba23120630ac45
                                                                            • Instruction ID: 5ed0657147c8b73632140d3e9f5542a85353bd31bade063e00ae9922314fe9ca
                                                                            • Opcode Fuzzy Hash: d797fe73337c4e2eb4fb2508b6ab0c4692f88574a12d919575ba23120630ac45
                                                                            • Instruction Fuzzy Hash: 3E112BB9900109EFDB41DF98D9818DEBBF8FB08200F1041A6E945E3224E771AA549F91
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0043B01B
                                                                            • _memset.LIBCMT ref: 0043B029
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,0048DD20,0048DD10,00443025,?,?), ref: 0043B057
                                                                            • CloseHandle.KERNEL32 ref: 0043B06A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CloseCreateHandleProcess
                                                                            • String ID:
                                                                            • API String ID: 3277943733-0
                                                                            • Opcode ID: a6a737845531d6415e177d8ab5a263c556b87d5c66bacd9f875ea3db2e3258fc
                                                                            • Instruction ID: f05de88fa9fc8f89f99b52edb0cce847e479071ba9285b60eea432d3825957bb
                                                                            • Opcode Fuzzy Hash: a6a737845531d6415e177d8ab5a263c556b87d5c66bacd9f875ea3db2e3258fc
                                                                            • Instruction Fuzzy Hash: 4CF05EF1A01248BEE6106B666C89F3F6BECFB89799F40087AB608911E1D7655C00C77D
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(0046BF68,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00403696
                                                                            • GetWindowThreadProcessId.USER32(0046BF68,00000000), ref: 004036AB
                                                                            • GetCurrentThreadId.KERNEL32 ref: 004036B2
                                                                            • AttachThreadInput.USER32(00000000,?,004034E9), ref: 004036B9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 2710830443-0
                                                                            • Opcode ID: 14bced3cef2af0c18d05c0a4240383f2fb7404795cf1e6ee7dae2738d382b1a9
                                                                            • Instruction ID: 7a87a1a375b3f198989fef204350efb3a0edaf969496c3c1576df2c4d5fc1547
                                                                            • Opcode Fuzzy Hash: 14bced3cef2af0c18d05c0a4240383f2fb7404795cf1e6ee7dae2738d382b1a9
                                                                            • Instruction Fuzzy Hash: 56E06D30688304BAEB205F60DC0AF953B5CAB10B41F108062F605A86E0D7FAA6918B1D
                                                                            APIs
                                                                              • Part of subcall function 004446D9: DeleteObject.GDI32(00000000), ref: 00444712
                                                                              • Part of subcall function 004446D9: ExtCreatePen.GDI32(?,00000001,00000000,00000000,00000000,?,?,00000000,?,?), ref: 0044474D
                                                                              • Part of subcall function 004446D9: SelectObject.GDI32(?,00000000), ref: 0044475C
                                                                              • Part of subcall function 004446D9: BeginPath.GDI32(?), ref: 00444773
                                                                              • Part of subcall function 004446D9: SelectObject.GDI32(?,00000000), ref: 00444796
                                                                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 004445CA
                                                                            • LineTo.GDI32(?,?,?), ref: 004445D9
                                                                            • EndPath.GDI32(?), ref: 004445EA
                                                                            • StrokePath.GDI32(?), ref: 004445F8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                                                            • String ID:
                                                                            • API String ID: 2783949968-0
                                                                            • Opcode ID: 34bda51a6fda84f81e069ee4d95fba6d5c090bd243ab8ffb62592d88b66157db
                                                                            • Instruction ID: 3758118343d4750d727ef0665c3930370f84d9d42ffac5ba78f435059b60c814
                                                                            • Opcode Fuzzy Hash: 34bda51a6fda84f81e069ee4d95fba6d5c090bd243ab8ffb62592d88b66157db
                                                                            • Instruction Fuzzy Hash: 75E06D31009651BFE7129F61AC0CF0F3E65AFC7724F104A18F291500A1D7A94519EBBF
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040D6DA: _wcscpy.LIBCMT ref: 0040D700
                                                                            • __wcsnicmp.LIBCMT ref: 0041C27F
                                                                            • WNetUseConnectionW.MPR(00000000,?,00000000,00000000,00000000,?,00000004,?), ref: 0041C329
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ConnectionMessage__wcsnicmp_wcscpy
                                                                            • String ID: LPT
                                                                            • API String ID: 741712790-1350329615
                                                                            • Opcode ID: 943025b21c6f4397b1981241d76277aa5414bf04574fe122b627a9eb212d70f8
                                                                            • Instruction ID: 8667c697530d131c363aaadc024dfa89098963c5104d1e4848e8a36f292a9413
                                                                            • Opcode Fuzzy Hash: 943025b21c6f4397b1981241d76277aa5414bf04574fe122b627a9eb212d70f8
                                                                            • Instruction Fuzzy Hash: B2511572A48304ABD710EAA5CCC1AAF73D9EB84318F04493FF895D7281D73C9D858B5A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: AQueue: Out of bounds.$Fatal Error
                                                                            • API String ID: 0-3755660557
                                                                            • Opcode ID: 7b9fbae8f974d508a6615eac6d78bebdc9c09c6896f2bada180f96db47bbd0f0
                                                                            • Instruction ID: 31452302858de2e1f40f9cc3a71bd2f619b239ab51cc958fb1c2789d6ac65b8d
                                                                            • Opcode Fuzzy Hash: 7b9fbae8f974d508a6615eac6d78bebdc9c09c6896f2bada180f96db47bbd0f0
                                                                            • Instruction Fuzzy Hash: 76318D31604200AFD724EF94C9E1EAA73A6BB46308F10041FE1566B261CB796D95DF2E
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00441306
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044131E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: '
                                                                            • API String ID: 3850602802-1997036262
                                                                            • Opcode ID: a0d2f925d729f907ef45bc474485d4387b4524f69e1ab6263f791a8fca5e2ede
                                                                            • Instruction ID: cce89c3997a82bac678b099204088c67ca3a35aed10d1e3a3287d23153ea8b7d
                                                                            • Opcode Fuzzy Hash: a0d2f925d729f907ef45bc474485d4387b4524f69e1ab6263f791a8fca5e2ede
                                                                            • Instruction Fuzzy Hash: 1C313DB1A003099FEF10CF99D884ADEB7F5BB58300F1545AAE909EB364D374A981CB58
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000143,00000000,00000000), ref: 004401E0
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004401EB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Combobox
                                                                            • API String ID: 3850602802-2096851135
                                                                            • Opcode ID: 48bf9e587ac2c39c261cb739e15c01063281518ce4f7939adfe67f9debe29d4b
                                                                            • Instruction ID: 9c155060b71f3215b163242da019c4fa4bf2b6a0451184aad5d0883039c8939f
                                                                            • Opcode Fuzzy Hash: 48bf9e587ac2c39c261cb739e15c01063281518ce4f7939adfe67f9debe29d4b
                                                                            • Instruction Fuzzy Hash: 9A115171540219AFFF228F50CC81AEB3B69FB18398F000126FA6416290C37A8D65DB99
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,C:\Users\user\Desktop\regsvr.exe,?,00412A47,0046BF68,?), ref: 0040DF75
                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,C:\Users\user\Desktop\regsvr.exe,?,00412A47,0046BF68,?,C:\Users\user\Desktop\regsvr.exe), ref: 0040DFA1
                                                                            Strings
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 0040DF44
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 626452242-2994071119
                                                                            • Opcode ID: a1f105ecd290a61d96f4836c3c9fc0c68ea3bfab3549afaa23a615e40b99d456
                                                                            • Instruction ID: 0d8ae40ea4ab6592c4c239bd722ee984cdff41b5b99d73c06b14422670dea1d2
                                                                            • Opcode Fuzzy Hash: a1f105ecd290a61d96f4836c3c9fc0c68ea3bfab3549afaa23a615e40b99d456
                                                                            • Instruction Fuzzy Hash: 6F0126325083417E9620AA679C88C6BBFFCDACBBA8B10463FF85192180D6359C05C675
                                                                            APIs
                                                                            • GetFullPathNameW.KERNEL32(00406CB1,00000104,?,00406CB1,C:\Users\user\Desktop\regsvr.exe), ref: 004066B4
                                                                            • __wcsicmp.LIBCMT ref: 004066CD
                                                                            Strings
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 004066A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FullNamePath__wcsicmp
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 1754126083-2994071119
                                                                            • Opcode ID: 6bc2b952cab003426f66052b122e33565d95482f85180817a27548c5a0f68373
                                                                            • Instruction ID: 9386017fc6f31d761f6bfba7f54a4404e4ec1ba09a855274c59845c6a2c5e9d7
                                                                            • Opcode Fuzzy Hash: 6bc2b952cab003426f66052b122e33565d95482f85180817a27548c5a0f68373
                                                                            • Instruction Fuzzy Hash: 15119E76804019AFDB00EF95D8818D9B7B8FF08304F01016BE906AB580DB74FAA58BD9
                                                                            APIs
                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 0043FF2B
                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0043FF3A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: LengthMessageSendTextWindow
                                                                            • String ID: edit
                                                                            • API String ID: 2978978980-2167791130
                                                                            • Opcode ID: efdaa1d49bcdd1ffca41c84ccc30374b6fa79a66c5b4ce5fded06fa1306ae62e
                                                                            • Instruction ID: 8bceae4a67a453d3a4a1470837663389651b214a43d7e0d54645d6ba3a2ef7ed
                                                                            • Opcode Fuzzy Hash: efdaa1d49bcdd1ffca41c84ccc30374b6fa79a66c5b4ce5fded06fa1306ae62e
                                                                            • Instruction Fuzzy Hash: D1117C35800209EFEF229F50CC05AEA3B65FB19354F105237FD54962A1C7BE88A9DF99
                                                                            APIs
                                                                              • Part of subcall function 00403615: GetClassNameW.USER32(?,?,000000FF), ref: 00403638
                                                                            • SendMessageW.USER32(?,000001A2,00000001,?), ref: 00402075
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 1e32ba23a944a4c74cb13862e0eca1481e26d3b8811df36141399f041e507439
                                                                            • Instruction ID: 082e513ad840fd57b487dd6fefb5a92c6f375689f3249c3e4a927c56088628e0
                                                                            • Opcode Fuzzy Hash: 1e32ba23a944a4c74cb13862e0eca1481e26d3b8811df36141399f041e507439
                                                                            • Instruction Fuzzy Hash: F8014E306412007BDB003B269C169EEBF69DF42358B10456BFD51B72D2CB7D4D46C749
                                                                            APIs
                                                                              • Part of subcall function 00403615: GetClassNameW.USER32(?,?,000000FF), ref: 00403638
                                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00401F7D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 6c5c36766434982d51c13ab68aaebe08b78210da1b5605266c4a6036b1243d63
                                                                            • Instruction ID: 62773ee196ef24d911481136b4e2257d4f09606f4393c0547db9bce723c0d376
                                                                            • Opcode Fuzzy Hash: 6c5c36766434982d51c13ab68aaebe08b78210da1b5605266c4a6036b1243d63
                                                                            • Instruction Fuzzy Hash: 14F0D130B411017BDB102A62AC16AEEBB6CDF42358F10406BFD01B32E2CB3D9E16969D
                                                                            APIs
                                                                              • Part of subcall function 00403615: GetClassNameW.USER32(?,?,000000FF), ref: 00403638
                                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00401FF8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 3678867486-1403004172
                                                                            • Opcode ID: 0bf9d83c2ed57e2538216df7ef16982298e3a98edb5a05628fd7e9a2c1ca66ae
                                                                            • Instruction ID: 37a606164421c250c264fa9ac2c6fe4bae94559fd78a80be4199356ec28cee51
                                                                            • Opcode Fuzzy Hash: 0bf9d83c2ed57e2538216df7ef16982298e3a98edb5a05628fd7e9a2c1ca66ae
                                                                            • Instruction Fuzzy Hash: 48F0F430A411017ADB0026229C06BEEBF6CDF02358F104427F901B32E2DB7D9D16965D
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AStack: top(): Out of bounds.,Fatal Error,00000010), ref: 0042DCB1
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AStack: top(): Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-807804664
                                                                            • Opcode ID: 112dfac08ce511ab15f37b6f14f0784d4a1e30fe69f5be75550ab7f24c86e631
                                                                            • Instruction ID: 8f46c36b54fa985028e42da948dda6bdf386e3d3f9aeab837cb5edead3e4afc4
                                                                            • Opcode Fuzzy Hash: 112dfac08ce511ab15f37b6f14f0784d4a1e30fe69f5be75550ab7f24c86e631
                                                                            • Instruction Fuzzy Hash: A8F09AB1B44220AFD3549F1BA800E12BBA4EF89B10B1640DBE102CB1B2D3F48482CB98
                                                                            APIs
                                                                              • Part of subcall function 004278F3: LoadLibraryA.KERNEL32(Wininet.dll,0042243C,0048BD28,C:\Users\user\Desktop\regsvr.exe,00000000), ref: 004278FE
                                                                              • Part of subcall function 004278F3: GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 00427910
                                                                            • Sleep.KERNEL32(0000000A), ref: 00422447
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 0042245F
                                                                            Strings
                                                                            • C:\Users\user\Desktop\regsvr.exe, xrefs: 0042242B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProcSleep
                                                                            • String ID: C:\Users\user\Desktop\regsvr.exe
                                                                            • API String ID: 938261879-2994071119
                                                                            • Opcode ID: c972a11a0518f64ede0ca227bc108b98dd2626021e8007c77fa4f101f0fd5fc5
                                                                            • Instruction ID: 5bbf96498581ada9825b25a95f9942dd18efb57540f7c2ac3a6986345d88b901
                                                                            • Opcode Fuzzy Hash: c972a11a0518f64ede0ca227bc108b98dd2626021e8007c77fa4f101f0fd5fc5
                                                                            • Instruction Fuzzy Hash: E7F0E931E00219BFDF156BA0F8087E9B7B4BB0531DF404191E420A109183FC1B88DF87
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy
                                                                            • String ID: .$3, 2, 10, 0
                                                                            • API String ID: 3048848545-502951267
                                                                            • Opcode ID: 9936b947a28a14f0059a2c4fe20ed655449cce3aa3cc3419f9ee7212f98e10b1
                                                                            • Instruction ID: 12577fe4d17f71e05d665a75b856234b759e9e4a80a78019ec3df315f3f0daf2
                                                                            • Opcode Fuzzy Hash: 9936b947a28a14f0059a2c4fe20ed655449cce3aa3cc3419f9ee7212f98e10b1
                                                                            • Instruction Fuzzy Hash: 80F096F295412896EB60ABF3E888BD922689B40304F90407FDD8D93052DB7C898987AD
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 004355CA
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AVector: []: Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-1727892082
                                                                            • Opcode ID: 79aca7342f3d133859bad9c8f31f64123d1fbc8bdf191b58cf552273821d522f
                                                                            • Instruction ID: 1def06a373dfeeca12979ddebabbf19776c06a63c7d669952d0f83b3389c869a
                                                                            • Opcode Fuzzy Hash: 79aca7342f3d133859bad9c8f31f64123d1fbc8bdf191b58cf552273821d522f
                                                                            • Instruction Fuzzy Hash: 64F074B1A652309FD6549F59A905A427FA8EB0CF6071681DBF508CB2B2D3F4C540CFD9
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,ExpressionStack: topnext(): Out of bounds.,Fatal Error,00000010), ref: 0040EBB6
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            • ExpressionStack: topnext(): Out of bounds., xrefs: 0040EBAF
                                                                            • Fatal Error, xrefs: 0040EBAA
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: ExpressionStack: topnext(): Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-576543216
                                                                            • Opcode ID: cd28ebb46fa2cd2b70bfcfdd34091d1433204def7822cbc6bf433e2b603cec38
                                                                            • Instruction ID: f15db652e2225a880293a33d4a06a8872c4c9b22a8427d7f750f35afd3ae1a3b
                                                                            • Opcode Fuzzy Hash: cd28ebb46fa2cd2b70bfcfdd34091d1433204def7822cbc6bf433e2b603cec38
                                                                            • Instruction Fuzzy Hash: E9F01C70248200AFEF14CB11C85AF2277E1AF14716F1988E6E1469F6E2E7B8E840CB08
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,ExpressionStack: top(): Out of bounds.,Fatal Error,00000010), ref: 0040EB6A
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            • ExpressionStack: top(): Out of bounds., xrefs: 0040EB63
                                                                            • Fatal Error, xrefs: 0040EB5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: ExpressionStack: top(): Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-3530518669
                                                                            • Opcode ID: 30d159229255455a692d9c080a65e3267e4635338d57db6af387dcef0b199423
                                                                            • Instruction ID: bf36d1335f76fc3780bd81d2a71791540fb1b87bac62fe6916850275b60fa39e
                                                                            • Opcode Fuzzy Hash: 30d159229255455a692d9c080a65e3267e4635338d57db6af387dcef0b199423
                                                                            • Instruction Fuzzy Hash: C4F030702042046FEF04CB11C959F6177E1AB00726F1988E6E5469F1E2D7F8E840CB09
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AStack: top(): Out of bounds.,Fatal Error,00000010), ref: 0040E28F
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AStack: top(): Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-807804664
                                                                            • Opcode ID: cb5cc5adc687c0cf4c5769d267381c0dca7a86e4d8f6a726063a0638e60e0f00
                                                                            • Instruction ID: 7c805db96070ec24acc295fa498f3c7831d804f25fddef3c29a7a91fbe1324f0
                                                                            • Opcode Fuzzy Hash: cb5cc5adc687c0cf4c5769d267381c0dca7a86e4d8f6a726063a0638e60e0f00
                                                                            • Instruction Fuzzy Hash: 8DE08C703842006FFB04A762CD0AB123BD4AB05706F0984EAF209AE1E2E7FCD810DA1D
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AVector: []: Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-1727892082
                                                                            • Opcode ID: cf4b73d056ed4ac200e0d4d02a1ed789f256c7dd48da4f701c139408e79d2593
                                                                            • Instruction ID: 9be9e6c4b0dd68ecdc0de2fa95b8379ea32650773cf42c8335e76bba7f595ae2
                                                                            • Opcode Fuzzy Hash: cf4b73d056ed4ac200e0d4d02a1ed789f256c7dd48da4f701c139408e79d2593
                                                                            • Instruction Fuzzy Hash: 26E04F70344204AFEB04DB21CC46B123390EB0071AF6985D9E509DA5E2D7FA9841DE59
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 0041A230
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AVector: []: Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-1727892082
                                                                            • Opcode ID: c4c3bf66395a0f333f3a71cf1f43215ea06ea6c1263c87fb6ccd6da15509056c
                                                                            • Instruction ID: 8a47efb699ee55220b8c5a985843356ec17489106a0e7530593c48f8e3f43de0
                                                                            • Opcode Fuzzy Hash: c4c3bf66395a0f333f3a71cf1f43215ea06ea6c1263c87fb6ccd6da15509056c
                                                                            • Instruction Fuzzy Hash: 80E086302442006FEE14DB21CC46B513790BB00725F6882D9E509DA1E2D7BA9491DE09
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0043A46A
                                                                            • PostMessageW.USER32(00000000), ref: 0043A471
                                                                              • Part of subcall function 0040D649: Sleep.KERNEL32(000000FA,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 0040D6CF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: 749246beacb5a8c5c301b55e4101993041db8e08e3df96aed0048648b3e80e9f
                                                                            • Instruction ID: 48fb15618dc0ba4576a11cf80406edc10fd560e4b88deb97e0e1af43a8436fe8
                                                                            • Opcode Fuzzy Hash: 749246beacb5a8c5c301b55e4101993041db8e08e3df96aed0048648b3e80e9f
                                                                            • Instruction Fuzzy Hash: 5DD0C7327883107AE3306771BC0FF876F549785B24F51492BB649FA1D0D5F574058A5D
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0043A434
                                                                            • PostMessageW.USER32(00000000), ref: 0043A43B
                                                                              • Part of subcall function 0040D649: Sleep.KERNEL32(000000FA,0048BA08,0048BA08,00000001,00000000,?,?,00418DD9,00000104,C:\Users\user\Desktop\regsvr.exe,C:\Users\user\Desktop\regsvr.exe), ref: 0040D6CF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: 1c0342ed96611791d8fe8dfe6e25ace9b0089e4835a6732b96a504d3157d86ca
                                                                            • Instruction ID: 3bf58ce236cca17576f640e849b018dfa1374f4d60a94a1dc5dfdd6b74bee6fa
                                                                            • Opcode Fuzzy Hash: 1c0342ed96611791d8fe8dfe6e25ace9b0089e4835a6732b96a504d3157d86ca
                                                                            • Instruction Fuzzy Hash: B1D0A7327883003AE3302771BC0FF876F149785B20F10492BB649BA0C0D5F464018A59
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AVector: back(): Out of bounds.,Fatal Error,00000010), ref: 0042DC1B
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AVector: back(): Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-3587719520
                                                                            • Opcode ID: 8a0f79b2a42af4f99ca72a2b768e2454e16de3eb9af4235599c58767b5cba9c6
                                                                            • Instruction ID: ca5af5f184b4b2cd7ac8e361517251aa5293cd53dae6816757278c8a4ff66cb2
                                                                            • Opcode Fuzzy Hash: 8a0f79b2a42af4f99ca72a2b768e2454e16de3eb9af4235599c58767b5cba9c6
                                                                            • Instruction Fuzzy Hash: E1D0A7713543006FF7802B61CC0AF427690AB04B2BF55C496F209890F2D7FC4880DE09
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AStack: top(): Out of bounds.,Fatal Error,00000010), ref: 0042DD67
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AStack: top(): Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-807804664
                                                                            • Opcode ID: 6478511c035588b9fc1475754a647044a89ab5dd99d75c660199ee88fffc1370
                                                                            • Instruction ID: 048a037f31bc114b1f104447ea4b43be77bb0b56ba3431b4f9bb2503e5b5d6f6
                                                                            • Opcode Fuzzy Hash: 6478511c035588b9fc1475754a647044a89ab5dd99d75c660199ee88fffc1370
                                                                            • Instruction Fuzzy Hash: 3BD05EB07846407FEB04A7219D0AF013F916B05705F19C0C6F24A9E0E2E7E8A8408B5D
                                                                            APIs
                                                                              • Part of subcall function 00454B7A: GetLastError.KERNEL32(?,00000000,00455081,0044EB47,00000001,004548D9,?,00000000,?,?,?,?,004549EB,?,0045321E), ref: 00454B7C
                                                                              • Part of subcall function 00454B7A: __calloc_crt.LIBCMT ref: 00454B9E
                                                                              • Part of subcall function 00454B7A: GetCurrentThreadId.KERNEL32 ref: 00454BCE
                                                                              • Part of subcall function 00454B7A: SetLastError.KERNEL32(00000000,?,00000000,00455081,0044EB47,00000001,004548D9,?,00000000,?,?,?,?,004549EB,?,0045321E), ref: 00454BE6
                                                                            • __freeptd.LIBCMT ref: 004525FB
                                                                              • Part of subcall function 00454D2A: TlsGetValue.KERNEL32(00000000,?,004531CE,00000000), ref: 00454D49
                                                                              • Part of subcall function 00454D2A: TlsGetValue.KERNEL32(?,004531CE,00000000), ref: 00454D5B
                                                                              • Part of subcall function 00454D2A: __freefls@4.LIBCMT ref: 00454D79
                                                                              • Part of subcall function 00454D2A: TlsSetValue.KERNEL32(00000017,00000000,004531CE,00000000), ref: 00454D8C
                                                                            • RtlExitUserThread.NTDLL(?), ref: 00452605
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Value$ErrorLastThread$CurrentExitUser__calloc_crt__freefls@4__freeptd
                                                                            • String ID: PYE
                                                                            • API String ID: 702801150-4264731808
                                                                            • Opcode ID: e0895a322ad5112cd0a9cd7ff21f55b5f86948114a42f3f92697bc67b668b196
                                                                            • Instruction ID: 1ebd5f279c9765c2aabde2c06cce9c6f6d12981ffae7ec9c05643d697544348c
                                                                            • Opcode Fuzzy Hash: e0895a322ad5112cd0a9cd7ff21f55b5f86948114a42f3f92697bc67b668b196
                                                                            • Instruction Fuzzy Hash: 63D0127041D2845EDB126B709D9910D3F38AD4221DB1408ABE885C8063EBAD8C58D75A
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00401D4A
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AVector: []: Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-1727892082
                                                                            • Opcode ID: 5d55dbec4248a7d93650ea0504143ce4b8e184e246d413738a50bb1a2f2ec49a
                                                                            • Instruction ID: 9cb18a6e4975aade5f716731f5f5dc766da51984c7689f4ee0b27d4d4a33823c
                                                                            • Opcode Fuzzy Hash: 5d55dbec4248a7d93650ea0504143ce4b8e184e246d413738a50bb1a2f2ec49a
                                                                            • Instruction Fuzzy Hash: 26C012203CC200BAFA5822B21C03B2611409B08B06F2009BBFA07E84E1FBE89040195E
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 0040748E
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AVector: []: Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-1727892082
                                                                            • Opcode ID: c87722ba72bdb56b61a83ae86292a05d8f06d142c7027ee5047f2329f405efae
                                                                            • Instruction ID: e16e7b034e27123991999e027b16225be71e0695c72ddd45102c60239b516ce7
                                                                            • Opcode Fuzzy Hash: c87722ba72bdb56b61a83ae86292a05d8f06d142c7027ee5047f2329f405efae
                                                                            • Instruction Fuzzy Hash: F2B092B13C83407AF84823A22C07F0515009708F06F204197F747E84E22BD810905D9F
                                                                            APIs
                                                                            • MessageBoxA.USER32(00000000,AQueue: Out of bounds.,Fatal Error,00000010), ref: 00441FC3
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Message_malloc
                                                                            • String ID: AQueue: Out of bounds.$Fatal Error
                                                                            • API String ID: 1566194552-3755660557
                                                                            • Opcode ID: 20cc1d628e019335fcc729881ed71db304ab6cc554e5a748984584389abab565
                                                                            • Instruction ID: 2f39cb63c6df9d17e9d0a8e4c0235f2bff0937ecf820d1867478f07b68a750a8
                                                                            • Opcode Fuzzy Hash: 20cc1d628e019335fcc729881ed71db304ab6cc554e5a748984584389abab565
                                                                            • Instruction Fuzzy Hash: C7B092B13C83413AF44423A12D07F0515005708F0AF204047F3A7A84E22FD810905D5F
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.4594440767.0000000000401000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.4594419976.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.0000000000476000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.000000000048F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594440767.00000000004A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.4594551723.00000000004A5000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandle
                                                                            • String ID:
                                                                            • API String ID: 2962429428-0
                                                                            • Opcode ID: 88269e377f4778dc7346e6cafbf600b6a89ad6f317a505b67e4d9d58882e8fad
                                                                            • Instruction ID: 91a0d2b3c63a57faf83c8bb310241df96875585c511dd917fba52827537c91db
                                                                            • Opcode Fuzzy Hash: 88269e377f4778dc7346e6cafbf600b6a89ad6f317a505b67e4d9d58882e8fad
                                                                            • Instruction Fuzzy Hash: 1EF08631100B019BC7319B5ACC81A57B3E49F68374B10463DD885A2AB0C379FC49CE04

                                                                            Execution Graph

                                                                            Execution Coverage:5.5%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:49
                                                                            execution_graph 51413 430850 51414 43085f _memset 51413->51414 51416 4308e7 51414->51416 51515 44e9ed 51414->51515 51506 405aa7 51416->51506 51419 430b10 51511 40fc41 51419->51511 51421 430975 GetStdHandle 51423 430984 CreateFileW 51421->51423 51424 4309ad 51421->51424 51422 43090e CreatePipe 51425 430925 51422->51425 51426 430928 GetCurrentProcess GetCurrentProcess DuplicateHandle 51422->51426 51423->51424 51427 4309aa 51423->51427 51429 430a26 GetStdHandle 51424->51429 51430 4309bc CreatePipe 51424->51430 51425->51426 51428 43094b 51426->51428 51427->51424 51428->51424 51431 430953 CloseHandle 51428->51431 51436 430a35 CreateFileW 51429->51436 51437 430a5e 51429->51437 51434 4309d6 51430->51434 51435 4309d9 GetCurrentProcess GetCurrentProcess DuplicateHandle 51430->51435 51431->51424 51432 430b17 _wcscpy 51433 405aa7 74 API calls 51432->51433 51454 430b3e _wcscpy 51432->51454 51438 430b37 51433->51438 51434->51435 51439 4309fc 51435->51439 51436->51437 51442 430a5b 51436->51442 51443 430a67 CreatePipe 51437->51443 51444 430ace GetStdHandle 51437->51444 51447 40fc41 109 API calls 51438->51447 51439->51437 51449 430a04 CloseHandle 51439->51449 51440 430b71 51450 430b87 51440->51450 51456 405aa7 74 API calls 51440->51456 51441 430b5f GetCurrentDirectoryW 51441->51440 51442->51437 51445 430a87 51443->51445 51446 430a8a GetCurrentProcess GetCurrentProcess DuplicateHandle 51443->51446 51444->51416 51448 430add CreateFileW 51444->51448 51445->51446 51453 430aaa 51446->51453 51447->51454 51448->51416 51455 430b03 51448->51455 51449->51437 51451 430c91 CreateProcessW 51450->51451 51452 430b97 51450->51452 51457 430cb9 51451->51457 51532 433dda LoadLibraryA GetProcAddress 51452->51532 51453->51416 51459 430ab2 CloseHandle 51453->51459 51454->51440 51454->51441 51455->51416 51460 430b82 51456->51460 51461 430d16 CloseHandle 51457->51461 51462 430cbd 51457->51462 51459->51416 51527 40fd19 51460->51527 51465 430d90 51461->51465 51466 430d24 51461->51466 51467 430cc6 51462->51467 51468 430cea 51462->51468 51463 430b9f 51469 430c6c 51463->51469 51483 430ba7 _memset 51463->51483 51497 430d8c 51465->51497 51552 40f437 CloseHandle CloseHandle CloseHandle CloseHandle 51465->51552 51470 430d30 CloseHandle 51466->51470 51471 430d39 51466->51471 51540 418b7f 51467->51540 51478 430cf5 GetLastError 51468->51478 51539 4187cb 115 API calls 4 library calls 51469->51539 51470->51471 51474 430d42 CloseHandle 51471->51474 51475 430d4b 51471->51475 51474->51475 51481 430d54 CloseHandle 51475->51481 51482 430d5d GetCurrentProcess GetCurrentProcess DuplicateHandle 51475->51482 51477 430dc1 51484 430d11 51477->51484 51485 430d08 51478->51485 51481->51482 51551 433e09 73 API calls 51482->51551 51533 40d6da 51483->51533 51488 430c89 51484->51488 51493 430df7 FreeLibrary 51484->51493 51548 4101fc 51485->51548 51486 430da2 51486->51497 51553 40f437 CloseHandle CloseHandle CloseHandle CloseHandle 51486->51553 51487 430c80 FreeLibrary 51487->51488 51489 430c7a 51489->51487 51489->51488 51493->51488 51494 430bee 51499 40d6da 73 API calls 51494->51499 51495 430de9 CloseHandle 51495->51484 51497->51477 51554 4102a8 VariantClear ctype 51497->51554 51500 430bfd 51499->51500 51500->51451 51537 433dda LoadLibraryA GetProcAddress 51500->51537 51502 430c16 51502->51451 51503 430c1a 51502->51503 51538 433dda LoadLibraryA GetProcAddress 51503->51538 51505 430c1f 51505->51457 51507 405aac MessageBoxA 51506->51507 51508 405ade 51506->51508 51509 44e9ed 73 API calls 51507->51509 51508->51419 51510 405ac7 51509->51510 51510->51419 51512 40fc4a 51511->51512 51513 40fc5c 51512->51513 51555 40fea7 109 API calls 5 library calls 51512->51555 51513->51432 51517 44e9f5 51515->51517 51518 4308b2 51517->51518 51523 44ea11 51517->51523 51556 450ae9 51517->51556 51575 44edae 65 API calls ___crtInitCritSecAndSpinCount 51517->51575 51518->51421 51518->51422 51520 44ea37 51577 4550d8 65 API calls 3 library calls 51520->51577 51522 44ea41 51578 455199 RaiseException 51522->51578 51523->51520 51576 44f408 72 API calls __cinit 51523->51576 51526 44ea56 51528 40fd4e 51527->51528 51529 40fd25 51527->51529 51528->51450 51529->51528 51588 44ef59 95 API calls _strtol 51529->51588 51531 40fd68 51531->51450 51532->51463 51534 40d6e4 __wtof_l 51533->51534 51535 44e9ed 73 API calls 51534->51535 51536 40d6f9 _wcscpy 51535->51536 51536->51494 51537->51502 51538->51505 51539->51489 51541 418b8c 51540->51541 51542 418ba3 GetLastError 51541->51542 51543 418bac 51541->51543 51544 418baf FormatMessageW 51542->51544 51543->51544 51589 40e30a 51544->51589 51546 418bca 51547 4189b9 115 API calls 3 library calls 51546->51547 51547->51489 51593 40fb8e 51548->51593 51550 410203 51550->51484 51551->51497 51552->51486 51553->51497 51554->51495 51555->51513 51557 450b96 51556->51557 51569 450af7 51556->51569 51586 44edae 65 API calls ___crtInitCritSecAndSpinCount 51557->51586 51559 450b9c 51587 45507c 65 API calls ___getgmtimebuf 51559->51587 51562 450ba2 51562->51517 51565 450b5a RtlAllocateHeap 51565->51569 51566 450b0c 51566->51569 51579 455383 65 API calls 2 library calls 51566->51579 51580 4551e3 65 API calls 7 library calls 51566->51580 51581 44eaa1 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 51566->51581 51568 450b8d 51568->51517 51569->51565 51569->51566 51569->51568 51570 450b81 51569->51570 51573 450b7f 51569->51573 51582 450a9a 65 API calls 4 library calls 51569->51582 51583 44edae 65 API calls ___crtInitCritSecAndSpinCount 51569->51583 51584 45507c 65 API calls ___getgmtimebuf 51570->51584 51585 45507c 65 API calls ___getgmtimebuf 51573->51585 51575->51517 51576->51520 51577->51522 51578->51526 51579->51566 51580->51566 51582->51569 51583->51569 51584->51573 51585->51568 51586->51559 51587->51562 51588->51531 51590 40e313 __wtof_l 51589->51590 51591 44e9ed 73 API calls 51590->51591 51592 40e32e _memcpy_s 51591->51592 51592->51546 51594 40fb99 ctype 51593->51594 51595 40fba7 VariantClear 51594->51595 51596 40fbae ctype 51594->51596 51595->51596 51596->51550 51597 4016e5 51598 4016fd 51597->51598 51599 401711 51598->51599 51600 401802 51598->51600 51631 4017c5 51598->51631 51603 401717 51599->51603 51604 4017cc 51599->51604 51601 4018b3 51600->51601 51602 40180f 51600->51602 51650 409d4f 85 API calls 51601->51650 51608 4018a1 51602->51608 51609 401817 51602->51609 51605 401793 SetTimer RegisterClipboardFormatW 51603->51605 51606 40171c 51603->51606 51645 422413 Sleep FreeLibrary LoadLibraryA GetProcAddress 51604->51645 51617 4017ba CreatePopupMenu 51605->51617 51605->51631 51611 401777 KillTimer 51606->51611 51612 40171f 51606->51612 51636 409c69 51608->51636 51614 401864 51609->51614 51615 40181e 51609->51615 51644 40a45a Shell_NotifyIconW _memset 51611->51644 51619 401724 51612->51619 51620 401759 MoveWindow 51612->51620 51613 4017f7 51646 418ea0 450 API calls ctype 51613->51646 51628 44e9ed 73 API calls 51614->51628 51614->51631 51622 401851 51615->51622 51623 401825 51615->51623 51617->51631 51618 401749 51618->51631 51626 401728 51619->51626 51627 40174b SetFocus 51619->51627 51620->51631 51649 40a4bd 98 API calls 51622->51649 51623->51631 51647 40a45a Shell_NotifyIconW _memset 51623->51647 51626->51623 51630 401731 51626->51630 51627->51631 51628->51631 51629 40178a PostQuitMessage 51629->51631 51643 422413 Sleep FreeLibrary LoadLibraryA GetProcAddress 51630->51643 51634 40184a 51648 409f5a 118 API calls _memset 51634->51648 51637 409d4c 51636->51637 51638 409c7a _memset 51636->51638 51637->51631 51651 40a282 51638->51651 51640 409d35 KillTimer SetTimer 51640->51637 51641 409c9f 51641->51640 51642 409d27 Shell_NotifyIconW 51641->51642 51642->51640 51643->51618 51644->51629 51645->51613 51646->51618 51647->51634 51648->51631 51649->51618 51650->51618 51652 40a29e 51651->51652 51670 40a450 51651->51670 51671 40e34a 73 API calls 51652->51671 51654 40a2ac 51655 40a2d3 51654->51655 51656 40a2b7 LoadStringW 51654->51656 51672 40e46d 51655->51672 51656->51655 51658 40a2ee 51659 40a2f7 51658->51659 51660 40a318 51658->51660 51661 40a310 51659->51661 51662 40a304 51659->51662 51676 40e505 51660->51676 51665 40e505 73 API calls 51661->51665 51664 40e46d 73 API calls 51662->51664 51668 40a30e _memset _wcscpy _wcsncpy 51664->51668 51665->51668 51666 40a327 51667 40e505 73 API calls 51666->51667 51666->51668 51667->51661 51669 40a43c Shell_NotifyIconW 51668->51669 51669->51670 51670->51641 51671->51654 51673 40e47a __wtof_l 51672->51673 51680 40e3fd 51673->51680 51675 40e485 _memcpy_s 51675->51658 51677 40e512 __wtof_l 51676->51677 51684 40e3b1 51677->51684 51679 40e51f _memcpy_s 51679->51666 51681 40e405 51680->51681 51683 40e426 51680->51683 51682 44e9ed 73 API calls 51681->51682 51682->51683 51683->51675 51685 40e3b9 51684->51685 51686 40e3d7 _memcpy_s 51684->51686 51687 44e9ed 73 API calls 51685->51687 51686->51679 51687->51686 51688 453c5e 51731 45570c 51688->51731 51690 453c6a GetStartupInfoW GetProcessHeap RtlAllocateHeap 51691 453c9c 51690->51691 51692 453ca9 GetVersionExA 51690->51692 51881 453bf9 65 API calls 2 library calls 51691->51881 51694 453cc7 GetProcessHeap HeapFree 51692->51694 51695 453cb9 GetProcessHeap HeapFree 51692->51695 51696 453cf3 51694->51696 51697 453ca3 __fcloseall 51695->51697 51732 457c57 HeapCreate 51696->51732 51699 453d34 51702 453d40 51699->51702 51882 453bf9 65 API calls 2 library calls 51699->51882 51741 454d93 GetModuleHandleA 51702->51741 51703 453d46 51704 453d51 __RTC_Initialize 51703->51704 51883 453bf9 65 API calls 2 library calls 51703->51883 51774 45b0d3 51704->51774 51707 453d5f 51708 453d6a 51707->51708 51884 44ea57 65 API calls 3 library calls 51707->51884 51791 45eefb 51708->51791 51716 453d8f 51837 45eac9 51716->51837 51720 453da0 51850 44eb73 51720->51850 51723 453da7 51725 453db2 __wwincmdln 51723->51725 51887 44ea57 65 API calls 3 library calls 51723->51887 51856 401902 51725->51856 51728 453de3 51889 44ed09 65 API calls _abort 51728->51889 51731->51690 51733 457c77 51732->51733 51734 457c7a 51732->51734 51733->51699 51890 457bfc 65 API calls 2 library calls 51734->51890 51736 457c7f 51737 457cad 51736->51737 51891 4570fd RtlAllocateHeap 51736->51891 51737->51699 51739 457c93 51739->51737 51740 457c98 HeapDestroy 51739->51740 51740->51733 51742 454da5 51741->51742 51743 454dae GetProcAddress GetProcAddress GetProcAddress GetProcAddress 51741->51743 51892 454a7e 68 API calls 2 library calls 51742->51892 51745 454df8 TlsAlloc 51743->51745 51748 454e46 TlsSetValue 51745->51748 51749 454f12 51745->51749 51746 454daa 51746->51703 51748->51749 51750 454e57 51748->51750 51749->51703 51893 44ed27 65 API calls 3 library calls 51750->51893 51752 454e5c 51894 45492a TlsGetValue 51752->51894 51755 45492a ___crtInitCritSecAndSpinCount 65 API calls 51756 454e77 51755->51756 51757 45492a ___crtInitCritSecAndSpinCount 65 API calls 51756->51757 51758 454e87 51757->51758 51759 45492a ___crtInitCritSecAndSpinCount 65 API calls 51758->51759 51760 454e97 51759->51760 51904 4553bc 65 API calls ___crtInitCritSecAndSpinCount 51760->51904 51762 454ea4 51763 454f0d 51762->51763 51905 4549a1 TlsGetValue 51762->51905 51922 454a7e 68 API calls 2 library calls 51763->51922 51769 4549a1 ___crtInitCritSecAndSpinCount 65 API calls 51770 454eeb 51769->51770 51770->51763 51771 454ef2 51770->51771 51921 454abb 65 API calls 5 library calls 51771->51921 51773 454efa GetCurrentThreadId 51773->51749 52004 45570c 51774->52004 51776 45b0df GetStartupInfoA 51777 456f77 __calloc_crt 65 API calls 51776->51777 51780 45b100 51777->51780 51778 45b30a __fcloseall 51778->51707 51779 45b251 51781 45b287 GetStdHandle 51779->51781 51782 45b2ec SetHandleCount 51779->51782 51784 45b299 GetFileType 51779->51784 51790 45b2b0 51779->51790 51780->51778 51780->51779 51783 456f77 __calloc_crt 65 API calls 51780->51783 51785 45b1d4 51780->51785 51781->51779 51782->51778 51783->51780 51784->51779 51785->51779 51786 45b1fd GetFileType 51785->51786 51787 45b208 51785->51787 51786->51785 51786->51787 51787->51778 51787->51785 52005 455ce7 65 API calls 3 library calls 51787->52005 51790->51778 51790->51779 52006 455ce7 65 API calls 3 library calls 51790->52006 51792 45ef0e GetCommandLineW 51791->51792 51793 45ef3b 51791->51793 51796 45ef14 51792->51796 51797 45ef20 GetLastError 51792->51797 51794 45ef2b 51793->51794 51795 45ef40 GetCommandLineW 51793->51795 51798 45ef49 GetCommandLineA MultiByteToWideChar 51794->51798 51805 453d70 51794->51805 51795->51805 51796->51795 51797->51794 51797->51805 51799 45ef69 51798->51799 51798->51805 51800 456f77 __calloc_crt 65 API calls 51799->51800 51801 45ef71 51800->51801 51802 45ef79 MultiByteToWideChar 51801->51802 51801->51805 51803 45ef8c 51802->51803 51802->51805 51804 450d38 __fcloseall 65 API calls 51803->51804 51804->51805 51806 45ed9a 51805->51806 51807 45edd1 51806->51807 51808 45edb2 GetEnvironmentStringsW 51806->51808 51810 45edba 51807->51810 51811 45ee39 51807->51811 51809 45edc6 GetLastError 51808->51809 51808->51810 51809->51807 51813 45ede9 GetEnvironmentStringsW 51810->51813 51814 45edf8 51810->51814 51812 45ee42 GetEnvironmentStrings 51811->51812 51815 453d7a 51811->51815 51812->51815 51822 45ee50 _strlen 51812->51822 51813->51814 51813->51815 52007 456f37 65 API calls _malloc 51814->52007 51831 45ecef GetModuleFileNameW 51815->51831 51817 45ee57 MultiByteToWideChar 51817->51815 51817->51822 51818 45ee7a 51820 456f77 __calloc_crt 65 API calls 51818->51820 51830 45ee87 __wtof_l _strlen 51820->51830 51821 45ee19 _memcpy_s 51823 45ee20 FreeEnvironmentStringsW 51821->51823 51822->51817 51822->51818 51823->51815 51824 45ee8f FreeEnvironmentStringsA 51824->51815 51825 45eea5 MultiByteToWideChar 51827 45eef2 51825->51827 51825->51830 51826 45eedf FreeEnvironmentStringsA 51826->51815 51828 450d38 __fcloseall 65 API calls 51827->51828 51829 45eef8 51828->51829 51829->51824 51830->51824 51830->51825 51830->51826 51832 45ed21 _wparse_cmdline 51831->51832 51833 453d84 51832->51833 51834 45ed5e 51832->51834 51833->51716 51885 44ea57 65 API calls 3 library calls 51833->51885 52008 456f37 65 API calls _malloc 51834->52008 51836 45ed64 _wparse_cmdline 51836->51833 51838 45eae2 __wtof_l 51837->51838 51840 453d95 51837->51840 51839 456f77 __calloc_crt 65 API calls 51838->51839 51844 45eb06 __wtof_l 51839->51844 51840->51720 51886 44ea57 65 API calls 3 library calls 51840->51886 51841 45eb68 51842 450d38 __fcloseall 65 API calls 51841->51842 51842->51840 51843 456f77 __calloc_crt 65 API calls 51843->51844 51844->51840 51844->51841 51844->51843 51845 45eb8d 51844->51845 51848 45eb50 51844->51848 52009 463299 65 API calls __cftoa_l 51844->52009 51846 450d38 __fcloseall 65 API calls 51845->51846 51846->51840 51848->51844 52010 454f21 8 API calls 3 library calls 51848->52010 51851 44eb7c __cinit 51850->51851 52011 4555ab 51851->52011 51853 44eb9b __initterm_e 51855 44ebbc __cinit 51853->51855 52015 44f408 72 API calls __cinit 51853->52015 51855->51723 52016 4108d2 51856->52016 51862 401a43 2 API calls 51863 401970 51862->51863 52023 44ed7d 51863->52023 51869 4019cc SystemParametersInfoW SystemParametersInfoW 51870 4019ea 51869->51870 52058 40108c GetCurrentDirectoryW 51870->52058 51873 401a04 SystemParametersInfoW 51874 401a10 51873->51874 51875 401a26 51874->51875 51876 401a1c FreeLibrary 51874->51876 51877 40fb8e ctype VariantClear 51875->51877 51876->51875 51878 401a2f 51877->51878 51879 40fb8e ctype VariantClear 51878->51879 51880 401a38 51879->51880 51880->51728 51888 44ece7 65 API calls _abort 51880->51888 51881->51697 51882->51702 51883->51704 51884->51708 51885->51716 51886->51720 51887->51725 51888->51728 51889->51697 51890->51736 51891->51739 51892->51746 51893->51752 51895 45493d 51894->51895 51896 45495e GetModuleHandleA 51894->51896 51895->51896 51897 454947 TlsGetValue 51895->51897 51898 454956 51896->51898 51899 45496f 51896->51899 51901 454952 51897->51901 51898->51755 51923 4548be 65 API calls 2 library calls 51899->51923 51901->51896 51901->51898 51902 454974 51902->51898 51903 454978 GetProcAddress 51902->51903 51903->51898 51904->51762 51906 4549d5 GetModuleHandleA 51905->51906 51907 4549b4 51905->51907 51908 4549e6 51906->51908 51909 4549cd 51906->51909 51907->51906 51910 4549be TlsGetValue 51907->51910 51924 4548be 65 API calls 2 library calls 51908->51924 51909->51763 51915 456f77 51909->51915 51913 4549c9 51910->51913 51912 4549eb 51912->51909 51914 4549ef GetProcAddress 51912->51914 51913->51906 51913->51909 51914->51909 51917 456f7b 51915->51917 51918 454ed1 51917->51918 51919 456f9b Sleep 51917->51919 51925 461104 51917->51925 51918->51763 51918->51769 51920 456fb0 51919->51920 51920->51917 51920->51918 51921->51773 51922->51749 51923->51902 51924->51912 51926 461110 __fcloseall 51925->51926 51927 461128 51926->51927 51937 461147 _memset 51926->51937 51938 45507c 65 API calls ___getgmtimebuf 51927->51938 51929 46112d 51939 45501d 65 API calls 2 library calls 51929->51939 51931 4611b9 RtlAllocateHeap 51931->51937 51932 46113d __fcloseall 51932->51917 51937->51931 51937->51932 51940 455532 51937->51940 51947 457919 5 API calls 2 library calls 51937->51947 51948 461200 RtlLeaveCriticalSection __freefls@4 51937->51948 51949 44edae 65 API calls ___crtInitCritSecAndSpinCount 51937->51949 51938->51929 51941 455545 51940->51941 51942 455558 RtlEnterCriticalSection 51940->51942 51950 45546f 51941->51950 51942->51937 51944 45554b 51944->51942 51979 44ea57 65 API calls 3 library calls 51944->51979 51946 455557 51946->51942 51947->51937 51948->51937 51949->51937 51951 45547b __fcloseall 51950->51951 51952 4554a3 51951->51952 51953 45548b 51951->51953 51961 4554b1 __fcloseall 51952->51961 51968 4554a1 51952->51968 51980 455383 65 API calls 2 library calls 51953->51980 51955 455490 51981 4551e3 65 API calls 7 library calls 51955->51981 51957 4554bc 51959 4554c3 51957->51959 51960 4554d2 51957->51960 51984 45507c 65 API calls ___getgmtimebuf 51959->51984 51964 455532 __lock 65 API calls 51960->51964 51961->51944 51962 455497 51982 44eaa1 GetModuleHandleA GetProcAddress ExitProcess ___crtCorExitProcess 51962->51982 51967 4554d9 51964->51967 51966 4554c8 51966->51961 51969 4554e1 51967->51969 51970 45550d 51967->51970 51968->51952 51983 456f37 65 API calls _malloc 51968->51983 51985 455ce7 65 API calls 3 library calls 51969->51985 51971 450d38 __fcloseall 65 API calls 51970->51971 51973 4554fe 51971->51973 52000 455529 RtlLeaveCriticalSection __freefls@4 51973->52000 51974 4554ec 51974->51973 51986 450d38 51974->51986 51977 4554f8 51999 45507c 65 API calls ___getgmtimebuf 51977->51999 51979->51946 51980->51955 51981->51962 51983->51957 51984->51966 51985->51974 51987 450d44 __fcloseall 51986->51987 51988 450d83 51987->51988 51990 455532 __lock 63 API calls 51987->51990 51994 450dbd __fcloseall _realloc 51987->51994 51989 450d98 RtlFreeHeap 51988->51989 51988->51994 51991 450daa 51989->51991 51989->51994 51996 450d5b ___sbh_find_block 51990->51996 52003 45507c 65 API calls ___getgmtimebuf 51991->52003 51993 450daf GetLastError 51993->51994 51994->51977 51995 450d75 52002 450d8e RtlLeaveCriticalSection __freefls@4 51995->52002 51996->51995 52001 457170 __VEC_memcpy VirtualFree VirtualFree HeapFree __shift 51996->52001 51999->51973 52000->51966 52001->51995 52002->51988 52003->51993 52004->51776 52005->51787 52006->51790 52007->51821 52008->51836 52009->51844 52010->51848 52012 4555af 52011->52012 52013 45492a ___crtInitCritSecAndSpinCount 65 API calls 52012->52013 52014 4555c7 52012->52014 52013->52012 52014->51853 52015->51855 52017 40fb8e ctype VariantClear 52016->52017 52018 401950 52017->52018 52019 401a43 52018->52019 52020 401967 52019->52020 52021 401a49 LoadLibraryA 52019->52021 52020->51862 52020->51863 52021->52020 52022 401a5a GetProcAddress 52021->52022 52022->52020 52024 455532 __lock 65 API calls 52023->52024 52025 44ed85 52024->52025 52026 4549a1 ___crtInitCritSecAndSpinCount 65 API calls 52025->52026 52027 44ed90 52026->52027 52028 45492a ___crtInitCritSecAndSpinCount 65 API calls 52027->52028 52029 44ed9b 52028->52029 52103 45545a RtlLeaveCriticalSection 52029->52103 52031 40198e 52032 44edd0 52031->52032 52033 401995 52032->52033 52034 44eddb 52032->52034 52039 4053ef GetVersionExW 52033->52039 52034->52033 52104 45507c 65 API calls ___getgmtimebuf 52034->52104 52036 44ede5 52105 45501d 65 API calls 2 library calls 52036->52105 52043 405438 __wtof_l _wcscpy 52039->52043 52040 405676 LoadLibraryA 52041 40568c GetProcAddress 52040->52041 52042 40569e 52040->52042 52041->52042 52044 4056a3 GetCurrentProcess 52041->52044 52042->52044 52043->52040 52045 4056b0 52044->52045 52046 4056d8 52045->52046 52047 40570e GetSystemInfo 52045->52047 52106 40576f 52046->52106 52055 405718 52047->52055 52050 405701 52054 405707 FreeLibrary 52050->52054 52050->52055 52051 405762 FreeLibrary 52052 40199f 52051->52052 52052->51869 52052->51870 52053 40576f 2 API calls 52056 4056ef GetNativeSystemInfo 52053->52056 52054->52055 52055->52051 52055->52052 52056->52050 52110 4013fe 52058->52110 52060 4010bb 52179 40e2b5 GetModuleHandleA 52060->52179 52063 4010c4 MessageBoxA 52065 4012b3 52063->52065 52064 4010dd 52066 40110b 52064->52066 52067 4010eb 52064->52067 52065->51873 52065->51874 52183 406bfc 52066->52183 52250 4065b2 73 API calls 52067->52250 52070 4010ff 52195 418bd1 52070->52195 52072 401133 GetFullPathNameW 52072->52070 52073 401124 52074 4012a6 SetCurrentDirectoryW 52073->52074 52074->52065 52077 401169 52251 40677e 74 API calls ctype 52077->52251 52078 40118f 52080 401241 52078->52080 52209 40d99a 52078->52209 52218 4012ba GetSysColorBrush LoadCursorW LoadIconW LoadIconW 52080->52218 52081 401173 SetCurrentDirectoryW 52081->52065 52086 4011ab 52086->52080 52088 4011b3 GetModuleFileNameW 52086->52088 52087 40124b 52089 40125e 52087->52089 52252 409f5a 118 API calls _memset 52087->52252 52090 4011c9 52088->52090 52091 40121a GetForegroundWindow ShellExecuteW 52088->52091 52225 418d3c 52089->52225 52094 40e30a 73 API calls 52090->52094 52100 40126a 52091->52100 52095 4011d7 52094->52095 52097 40e505 73 API calls 52095->52097 52098 4011df 52097->52098 52099 40e505 73 API calls 52098->52099 52101 4011e7 GetForegroundWindow ShellExecuteW 52099->52101 52253 40677e 74 API calls ctype 52100->52253 52102 401214 52101->52102 52102->52100 52103->52031 52104->52036 52107 4056e6 52106->52107 52108 405775 LoadLibraryA 52106->52108 52107->52050 52107->52053 52108->52107 52109 405786 GetProcAddress 52108->52109 52109->52107 52254 40e2de 52110->52254 52114 401432 GetModuleFileNameW 52115 44e9ed 73 API calls 52114->52115 52116 40145b 52115->52116 52117 40146a 52116->52117 52323 40e37d 52116->52323 52119 40e30a 73 API calls 52117->52119 52120 401481 52119->52120 52121 401492 52120->52121 52326 40e27c 74 API calls 52120->52326 52268 40f7d3 52121->52268 52124 4014a9 52125 4101fc VariantClear 52124->52125 52126 4014bb 52125->52126 52127 40e30a 73 API calls 52126->52127 52128 4014c8 52127->52128 52129 4014dc 52128->52129 52327 40e27c 74 API calls 52128->52327 52131 40f7d3 77 API calls 52129->52131 52132 4014f3 52131->52132 52133 40e30a 73 API calls 52132->52133 52134 40150a 52133->52134 52283 40e0b7 52134->52283 52136 40151b 52137 40e2de 73 API calls 52136->52137 52138 401532 52137->52138 52289 401c0e 52138->52289 52143 401567 52145 44e8b8 __wcsicmp 103 API calls 52143->52145 52144 401c0e 74 API calls 52144->52143 52146 401574 52145->52146 52147 401590 52146->52147 52148 401c0e 74 API calls 52146->52148 52149 44e8b8 __wcsicmp 103 API calls 52147->52149 52148->52147 52150 40159d 52149->52150 52151 4015a6 GetModuleFileNameW 52150->52151 52152 4015ec 52150->52152 52154 401c0e 74 API calls 52151->52154 52153 44e8b8 __wcsicmp 103 API calls 52152->52153 52156 4015f9 52153->52156 52155 4015cc 52154->52155 52328 40e441 52155->52328 52159 401c0e 74 API calls 52156->52159 52163 40162b _wcscpy 52156->52163 52158 4015d9 52161 401c0e 74 API calls 52158->52161 52162 401611 _wcscpy 52159->52162 52160 401650 52305 4114ee 52160->52305 52164 4015e7 52161->52164 52169 401c0e 74 API calls 52162->52169 52163->52160 52166 401c0e 74 API calls 52163->52166 52164->52152 52166->52160 52169->52163 52171 4101fc VariantClear 52174 40167e 52171->52174 52172 4016ac 52175 40fb8e ctype VariantClear 52172->52175 52173 41162a 74 API calls 52173->52174 52174->52172 52174->52173 52177 401c0e 74 API calls 52174->52177 52332 4102f4 74 API calls ctype 52174->52332 52178 4016bd ctype 52175->52178 52177->52174 52178->52060 52180 40e2c4 GetProcAddress 52179->52180 52181 4010c0 52179->52181 52180->52181 52182 40e2d4 52180->52182 52181->52063 52181->52064 52182->52181 52184 406c16 _memset 52183->52184 52190 401120 52184->52190 52374 40c4db 52184->52374 52186 406c7e 52378 40c50f 52186->52378 52188 406c86 52385 4514e8 52188->52385 52190->52072 52190->52073 53054 406a64 52195->53054 52199 418bf0 52208 401165 52199->52208 53065 419090 118 API calls 52199->53065 52201 418bf9 52202 418bfd GetFullPathNameW 52201->52202 52201->52208 52203 40e46d 73 API calls 52202->52203 52204 418c27 52203->52204 52205 40e46d 73 API calls 52204->52205 52206 418c34 _wcscat 52205->52206 52207 40e46d 73 API calls 52206->52207 52207->52208 52208->52077 52208->52078 52210 40d9a5 52209->52210 52211 40d9a9 OpenSCManagerW 52209->52211 52210->52086 52212 40d9e4 52211->52212 52213 40d9ba LockServiceDatabase 52211->52213 52212->52086 52214 40d9c5 UnlockServiceDatabase 52213->52214 52215 40d9ce GetLastError 52213->52215 52216 40d9db 52214->52216 52215->52216 52217 40d9dd CloseServiceHandle 52215->52217 52216->52217 52217->52212 52219 401310 52218->52219 53068 40d830 52219->53068 52221 401325 RegisterClassExW 53073 43acc5 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 52221->53073 52224 40138d CreateWindowExW CreateWindowExW ShowWindow ShowWindow 52224->52087 52226 418d74 52225->52226 52227 418d57 52225->52227 52238 418db2 52226->52238 53143 429f8a 52226->53143 53142 4187cb 115 API calls 4 library calls 52227->53142 52231 418e0e 52233 418e36 52231->52233 52234 418d6c 52231->52234 53158 422413 Sleep FreeLibrary LoadLibraryA GetProcAddress 52233->53158 52234->52100 52237 418e10 52240 4101fc VariantClear 52237->52240 52238->52231 52238->52237 53077 418c78 52238->53077 53086 418f7b 52238->53086 53107 429c2b 52238->53107 52239 418e42 53159 43bf2c 75 API calls 52239->53159 52240->52231 52243 418e47 52243->52234 53160 418ea0 450 API calls ctype 52243->53160 52245 418e56 LockWindowUpdate 52247 418e69 52245->52247 52248 418e87 GetMessageW 52247->52248 52248->52234 52249 418e71 TranslateMessage DispatchMessageW 52248->52249 52249->52248 52250->52070 52251->52081 52252->52089 52253->52074 52255 44e9ed 73 API calls 52254->52255 52256 401414 52255->52256 52257 401a75 52256->52257 52258 401a82 ctype 52257->52258 52259 40e46d 73 API calls 52258->52259 52260 401aa2 52259->52260 52262 401ba0 52260->52262 52264 40e30a 73 API calls 52260->52264 52333 401c6f 73 API calls 52260->52333 52261 40e30a 73 API calls 52263 401bf6 52261->52263 52262->52261 52267 401bfe 52262->52267 52334 401c6f 73 API calls 52263->52334 52264->52260 52267->52114 52269 40f7ea 52268->52269 52270 40f7fb 52269->52270 52271 40f7ee 52269->52271 52273 44e9ed 73 API calls 52270->52273 52335 410048 52271->52335 52274 40f803 52273->52274 52275 40f811 52274->52275 52276 40e2de 73 API calls 52274->52276 52277 40e441 73 API calls 52275->52277 52276->52275 52278 40f81c 52277->52278 52279 44e9ed 73 API calls 52278->52279 52280 40f829 52279->52280 52281 410048 77 API calls 52280->52281 52282 40f7f9 52281->52282 52282->52124 52284 40e0d9 52283->52284 52285 40e0bd 52283->52285 52288 40e0c0 52284->52288 52365 40e27c 74 API calls 52284->52365 52285->52288 52364 40e27c 74 API calls 52285->52364 52288->52136 52290 401c15 52289->52290 52291 401c27 52289->52291 52292 40e46d 73 API calls 52290->52292 52295 401c36 52291->52295 52366 401d3c 74 API calls 52291->52366 52293 40153e 52292->52293 52297 44e8b8 52293->52297 52296 40e441 73 API calls 52295->52296 52296->52293 52298 44e8c4 52297->52298 52299 44e935 52297->52299 52304 40154b 52298->52304 52367 45507c 65 API calls ___getgmtimebuf 52298->52367 52369 44e7a9 103 API calls 3 library calls 52299->52369 52302 44e8d1 52368 45501d 65 API calls 2 library calls 52302->52368 52304->52143 52304->52144 52306 4114fe 52305->52306 52308 411503 ctype 52305->52308 52370 41142c 74 API calls ctype 52306->52370 52314 40166b 52308->52314 52371 411471 VariantClear ctype 52308->52371 52310 411537 52311 44e9ed 73 API calls 52310->52311 52310->52314 52312 4115a5 52311->52312 52313 44e9ed 73 API calls 52312->52313 52313->52314 52315 41162a 52314->52315 52316 411637 52315->52316 52319 41163e 52315->52319 52372 41142c 74 API calls ctype 52316->52372 52318 44e9ed 73 API calls 52320 41167e 52318->52320 52319->52318 52321 401673 52319->52321 52320->52321 52373 40f90d 73 API calls 52320->52373 52321->52171 52324 44e9ed 73 API calls 52323->52324 52325 40e39b _memcpy_s 52324->52325 52325->52117 52326->52121 52327->52129 52329 40e448 52328->52329 52331 40e454 _memcpy_s 52328->52331 52330 40e3fd 73 API calls 52329->52330 52330->52331 52331->52158 52332->52174 52333->52260 52334->52267 52336 410057 52335->52336 52362 410076 _memcpy_s 52335->52362 52337 40fb8e ctype VariantClear 52336->52337 52338 41005e 52337->52338 52339 410177 52338->52339 52340 410146 52338->52340 52341 4100b9 52338->52341 52342 4100fc 52338->52342 52343 41008e 52338->52343 52338->52362 52347 44e9ed 73 API calls 52339->52347 52344 44e9ed 73 API calls 52340->52344 52345 44e9ed 73 API calls 52341->52345 52350 44e9ed 73 API calls 52342->52350 52342->52362 52346 44e9ed 73 API calls 52343->52346 52348 41014d 52344->52348 52345->52362 52349 410095 52346->52349 52351 41017e 52347->52351 52357 40e30a 73 API calls 52348->52357 52361 410169 52348->52361 52359 40e37d 73 API calls 52349->52359 52349->52362 52352 41010c VariantInit VariantCopy 52350->52352 52353 4101b0 52351->52353 52354 41018f 52351->52354 52360 410128 VariantClear 52352->52360 52352->52362 52356 44e9ed 73 API calls 52353->52356 52355 44e9ed 73 API calls 52354->52355 52355->52362 52356->52362 52357->52361 52359->52362 52360->52362 52363 40ebef 73 API calls 52361->52363 52362->52282 52363->52362 52364->52288 52365->52288 52366->52295 52367->52302 52369->52304 52370->52308 52371->52310 52372->52319 52373->52321 52375 40d6da 73 API calls 52374->52375 52376 40c4eb GetFullPathNameW 52375->52376 52377 40c504 52376->52377 52377->52186 52428 44e973 52378->52428 52380 40c52a SHGetMalloc 52381 40c54b SHGetDesktopFolder 52380->52381 52383 40c53a _wcscpy 52380->52383 52382 40c559 52381->52382 52381->52383 52382->52383 52384 40c57b SHGetPathFromIDListW 52382->52384 52383->52188 52384->52383 52430 4512da 52385->52430 52388 406697 GetFullPathNameW 52392 4066be 52388->52392 52389 4066de 52391 40d6da 73 API calls 52389->52391 52390 44e8b8 __wcsicmp 103 API calls 52390->52392 52393 4066ea 52391->52393 52392->52389 52392->52390 52394 406716 52392->52394 52460 427c0d 73 API calls 52393->52460 52399 40670d 52394->52399 52462 407480 74 API calls 52394->52462 52396 4066fa 52461 427c0d 73 API calls 52396->52461 52400 4071c2 52399->52400 52463 412a2c 52400->52463 52403 407219 52481 412f5e 52403->52481 52404 4071dc 52405 4071e1 52404->52405 52406 4071f6 52404->52406 52530 40bb27 108 API calls _printf 52405->52530 52531 406cc1 192 API calls 3 library calls 52406->52531 52411 4071ee 52421 407214 52411->52421 52412 40722d 52412->52405 52415 407233 52412->52415 52413 40723e 52414 44e9ed 73 API calls 52413->52414 52427 40728a 52414->52427 52416 4520b6 __fcloseall 104 API calls 52415->52416 52416->52405 52417 4073f5 52418 450d38 __fcloseall 65 API calls 52417->52418 52419 4073fb 52418->52419 52419->52421 52517 4520b6 52419->52517 52421->52190 52427->52417 52532 407163 73 API calls _memcpy_s 52427->52532 52533 407424 103 API calls __wcsnicmp 52427->52533 52534 40f50f 73 API calls 2 library calls 52427->52534 52535 4074e3 73 API calls 52427->52535 52536 4075af 73 API calls 52427->52536 52429 44e97b 52428->52429 52429->52380 52429->52429 52431 451373 52430->52431 52437 4512f2 52430->52437 52432 4514b5 52431->52432 52433 45149a 52431->52433 52458 45507c 65 API calls ___getgmtimebuf 52432->52458 52456 45507c 65 API calls ___getgmtimebuf 52433->52456 52436 45149f 52442 406ca8 52436->52442 52457 45501d 65 API calls 2 library calls 52436->52457 52437->52431 52446 451361 52437->52446 52452 458090 65 API calls __cftoa_l 52437->52452 52440 451448 52440->52431 52440->52442 52444 4514c8 52440->52444 52441 4513ff 52441->52431 52443 451419 52441->52443 52454 458090 65 API calls __cftoa_l 52441->52454 52442->52388 52443->52431 52443->52442 52448 451432 52443->52448 52459 458090 65 API calls __cftoa_l 52444->52459 52446->52431 52451 4513e0 52446->52451 52453 458090 65 API calls __cftoa_l 52446->52453 52455 458090 65 API calls __cftoa_l 52448->52455 52451->52440 52451->52441 52452->52446 52453->52451 52454->52443 52455->52442 52456->52436 52458->52436 52459->52442 52460->52396 52461->52399 52462->52399 52537 40df43 52463->52537 52465 412a47 _strcat _strlen 52544 41210b 52465->52544 52471 412ace 52472 412ad6 52471->52472 52473 412adf 52471->52473 52474 4520b6 __fcloseall 104 API calls 52472->52474 52560 4523ce 52473->52560 52476 4071d8 52474->52476 52476->52403 52476->52404 52482 412f77 52481->52482 52483 451d73 _fseek 103 API calls 52482->52483 52484 412f89 52483->52484 52956 4130ce 52484->52956 52487 4523ce __fread_nolock 79 API calls 52488 412fb6 52487->52488 52489 4523ce __fread_nolock 79 API calls 52488->52489 52490 412fc4 52489->52490 52491 4523ce __fread_nolock 79 API calls 52490->52491 52492 412fdd 52491->52492 52493 4523ce __fread_nolock 79 API calls 52492->52493 52494 412ff6 52493->52494 52514 407229 52514->52412 52514->52413 52530->52411 52531->52421 52532->52427 52533->52427 52534->52427 52535->52427 52536->52427 52538 40df51 __wtof_l 52537->52538 52539 40df64 WideCharToMultiByte 52537->52539 52538->52539 52540 40df81 52539->52540 52541 40df7d 52539->52541 52542 44e9ed 73 API calls 52540->52542 52541->52465 52543 40df91 WideCharToMultiByte 52542->52543 52543->52541 52545 412126 _memset 52544->52545 52547 4121ae 52545->52547 52579 4517b6 52545->52579 52548 451cd9 52547->52548 52594 451c13 52548->52594 52550 412abc 52550->52476 52551 412b2b 52550->52551 52553 412b38 _strcat _memcpy_s 52551->52553 52552 4523ce __fread_nolock 79 API calls 52552->52553 52553->52552 52555 412be1 52553->52555 52559 412c01 __tzset_nolock 52553->52559 52650 451d73 52553->52650 52556 451d73 _fseek 103 API calls 52555->52556 52557 412bef 52556->52557 52558 4523ce __fread_nolock 79 API calls 52557->52558 52558->52559 52559->52471 52777 452338 52560->52777 52562 412aec 52563 412c26 52562->52563 52948 41288d 52563->52948 52565 412c3c 52580 4517c4 52579->52580 52581 4517e1 52579->52581 52590 45507c 65 API calls ___getgmtimebuf 52580->52590 52581->52580 52583 4517e8 52581->52583 52592 458ae0 101 API calls 14 library calls 52583->52592 52584 4517c9 52591 45501d 65 API calls 2 library calls 52584->52591 52587 45180e 52588 4517d9 52587->52588 52593 45642e 99 API calls 5 library calls 52587->52593 52588->52545 52590->52584 52592->52587 52593->52588 52597 451c1f __fcloseall 52594->52597 52595 451c32 52629 45507c 65 API calls ___getgmtimebuf 52595->52629 52597->52595 52599 451c68 52597->52599 52598 451c37 52630 45501d 65 API calls 2 library calls 52598->52630 52613 459954 68 API calls 7 library calls 52599->52613 52602 451c6d 52603 451c74 52602->52603 52604 451c81 52602->52604 52631 45507c 65 API calls ___getgmtimebuf 52603->52631 52605 451ca9 52604->52605 52606 451c89 52604->52606 52614 4596c8 52605->52614 52632 45507c 65 API calls ___getgmtimebuf 52606->52632 52610 451c47 __fcloseall @_EH4_CallFilterFunc@8 52610->52550 52613->52602 52623 4596e9 __wopenfile 52614->52623 52615 459703 52637 45507c 65 API calls ___getgmtimebuf 52615->52637 52616 4598b2 52616->52615 52620 45990a 52616->52620 52618 459708 52638 45501d 65 API calls 2 library calls 52618->52638 52634 462b63 52620->52634 52623->52615 52623->52616 52624 44e8b8 __wcsicmp 103 API calls 52623->52624 52625 4598ac 52624->52625 52625->52616 52626 44e8b8 __wcsicmp 103 API calls 52625->52626 52627 4598c8 52626->52627 52627->52616 52628 44e8b8 __wcsicmp 103 API calls 52627->52628 52628->52616 52629->52598 52631->52610 52632->52610 52633 451ccf RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 52633->52610 52639 462a97 52634->52639 52636 451cb4 52636->52633 52637->52618 52640 462aa3 __fcloseall 52639->52640 52641 462ab6 52640->52641 52643 462af4 52640->52643 52642 45507c __cftoa_l 65 API calls 52641->52642 52644 462abb 52642->52644 52645 46233d __sopen_helper 130 API calls 52643->52645 52646 45501d __cftoa_l 65 API calls 52644->52646 52647 462b0e 52645->52647 52649 462aca __fcloseall 52646->52649 52648 462b35 __sopen_helper RtlLeaveCriticalSection 52647->52648 52648->52649 52649->52636 52651 451d7f __fcloseall 52650->52651 52652 451d8d 52651->52652 52654 451dbb 52651->52654 52681 45507c 65 API calls ___getgmtimebuf 52652->52681 52663 4534ec 52654->52663 52655 451d92 52682 45501d 65 API calls 2 library calls 52655->52682 52658 451dc3 52669 451cec 52658->52669 52662 451da2 __fcloseall 52662->52553 52664 45351c RtlEnterCriticalSection 52663->52664 52665 4534fa 52663->52665 52664->52658 52665->52664 52666 453502 52665->52666 52667 455532 __lock 65 API calls 52666->52667 52668 453512 52667->52668 52668->52658 52670 451d0a 52669->52670 52671 451cfa 52669->52671 52672 451d1c 52670->52672 52684 452f89 52670->52684 52739 45507c 65 API calls ___getgmtimebuf 52671->52739 52701 452b85 52672->52701 52674 451cff 52683 451dee RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 52674->52683 52681->52655 52683->52662 52685 452fba 52684->52685 52686 452f9a 52684->52686 52687 452a09 __flswbuf 65 API calls 52685->52687 52740 45507c 65 API calls ___getgmtimebuf 52686->52740 52689 452fc0 52687->52689 52692 459c49 __locking 69 API calls 52689->52692 52690 452f9f 52741 45501d 65 API calls 2 library calls 52690->52741 52693 452fd5 52692->52693 52702 451d2a 52701->52702 52703 452b9a 52701->52703 52707 452a09 52702->52707 52703->52702 52704 452a09 __flswbuf 65 API calls 52703->52704 52705 452bb4 52704->52705 52743 45a611 99 API calls 4 library calls 52705->52743 52708 452a14 52707->52708 52709 451d5b 52707->52709 52744 45507c 65 API calls ___getgmtimebuf 52708->52744 52714 459c49 52709->52714 52711 452a19 52739->52674 52740->52690 52743->52702 52744->52711 52778 452344 __fcloseall 52777->52778 52779 45238d 52778->52779 52780 452382 __fcloseall 52778->52780 52782 452358 _memset 52778->52782 52781 4534ec _fprintf 66 API calls 52779->52781 52780->52562 52783 452395 52781->52783 52806 45507c 65 API calls ___getgmtimebuf 52782->52806 52790 452132 52783->52790 52786 452372 52807 45501d 65 API calls 2 library calls 52786->52807 52791 45216c 52790->52791 52794 45214e _memset 52790->52794 52808 4523c4 RtlLeaveCriticalSection RtlLeaveCriticalSection _fseek 52791->52808 52792 452157 52859 45507c 65 API calls ___getgmtimebuf 52792->52859 52794->52791 52794->52792 52797 4521ab 52794->52797 52797->52791 52798 4522c7 _memset 52797->52798 52799 452a09 __flswbuf 65 API calls 52797->52799 52805 4522f3 _memset 52797->52805 52809 45af5b 52797->52809 52839 45a87a 52797->52839 52861 45b058 65 API calls 3 library calls 52797->52861 52862 45507c 65 API calls ___getgmtimebuf 52798->52862 52799->52797 52804 45215c 52860 45501d 65 API calls 2 library calls 52804->52860 52863 45507c 65 API calls ___getgmtimebuf 52805->52863 52806->52786 52808->52780 52810 45af67 __fcloseall 52809->52810 52811 45af6f 52810->52811 52812 45af8a 52810->52812 52840 45a886 52839->52840 52843 45a8a3 52839->52843 52859->52804 52861->52797 52862->52804 52863->52804 52951 452f3f GetSystemTimeAsFileTime 52948->52951 52950 41289c 52950->52565 52952 452f6d __aulldiv 52951->52952 52952->52950 52958 4130dd __tzset_nolock _wcscpy 52956->52958 52957 4523ce 79 API calls __fread_nolock 52957->52958 52958->52957 52959 412c26 GetSystemTimeAsFileTime 52958->52959 52960 412f9d 52958->52960 52961 451d73 103 API calls _fseek 52958->52961 52959->52958 52960->52487 52960->52514 52961->52958 53055 406a77 53054->53055 53056 406a7e 53054->53056 53055->52208 53064 42d294 117 API calls 53055->53064 53056->53055 53057 44e9ed 73 API calls 53056->53057 53058 406aa5 53057->53058 53059 44e9ed 73 API calls 53058->53059 53060 406b0b 53059->53060 53061 406b7e 53060->53061 53066 407671 140 API calls 53060->53066 53067 4075af 73 API calls 53060->53067 53064->52199 53065->52201 53066->53060 53067->53060 53069 40d852 EnumResourceNamesW 53068->53069 53070 40d836 LoadImageW 53068->53070 53071 40d88c LoadImageW 53069->53071 53072 40d89e 53069->53072 53070->52221 53071->53072 53072->52221 53074 43ad5d LoadIconW 53073->53074 53076 401246 53074->53076 53076->52224 53078 418c87 53077->53078 53079 418c8b 53077->53079 53078->52238 53079->53078 53080 418c9d PeekMessageW 53079->53080 53081 418cf6 53080->53081 53083 418cb5 53080->53083 53081->52238 53083->53081 53084 418ce2 PeekMessageW 53083->53084 53085 418cce TranslateMessage DispatchMessageW 53083->53085 53161 43ad9e 53083->53161 53084->53081 53084->53083 53085->53084 53166 4195b3 53086->53166 53089 418f8f 53089->52238 53090 418fa8 Sleep 53090->53089 53092 418fb7 53092->53089 53186 4196e6 450 API calls ctype 53092->53186 53094 418fc2 53094->53089 53214 41991a 450 API calls ctype 53094->53214 53096 418fcc 53096->53089 53187 419838 450 API calls ctype 53096->53187 53098 418fd5 53098->53089 53099 418fe2 GetExitCodeProcess 53098->53099 53100 419026 53098->53100 53099->53090 53101 418ffd CloseHandle 53099->53101 53215 4300ab 180 API calls 53100->53215 53103 4101fc VariantClear 53101->53103 53105 419013 53103->53105 53104 41902d 53104->53089 53188 4378e9 53104->53188 53105->53089 53354 41a21d 53107->53354 53109 429c4b 53110 429d63 53109->53110 53111 429c56 53109->53111 53524 42af4e 53110->53524 53113 429d0d 53111->53113 53114 429c5d 53111->53114 53507 429d78 53113->53507 53116 429d03 53114->53116 53117 429c66 53114->53117 53430 42a8d6 53116->53430 53118 429c69 53117->53118 53119 429cdf 53117->53119 53122 429c6c 53118->53122 53129 429c87 53118->53129 53359 429fd7 53119->53359 53121 429d01 53124 429d58 53121->53124 53126 41a21d 74 API calls 53121->53126 53127 41a21d 74 API calls 53122->53127 53128 429cda 53122->53128 53125 40fb8e ctype VariantClear 53124->53125 53125->53128 53130 429d3d 53126->53130 53131 429c80 53127->53131 53128->52238 53132 429c98 53129->53132 53133 429cad 53129->53133 53130->53124 53134 41a21d 74 API calls 53130->53134 53579 4187cb 115 API calls 4 library calls 53131->53579 53135 41a21d 74 API calls 53132->53135 53578 42ad16 450 API calls ctype 53133->53578 53137 429d4e 53134->53137 53135->53131 53580 4187cb 115 API calls 4 library calls 53137->53580 53139 429cb9 53139->53128 53141 41a21d 74 API calls 53139->53141 53141->53131 53142->52234 53144 40e30a 73 API calls 53143->53144 53145 429f9b 53144->53145 54799 40f5d7 53145->54799 53147 418d9f 53147->52238 53148 419eca 53147->53148 53149 419ef3 53148->53149 53150 419eee 53148->53150 53151 418d3c 450 API calls 53149->53151 53152 40e114 74 API calls 53150->53152 53153 419efd 53151->53153 53152->53149 53154 419f08 53153->53154 54802 40e16e VariantClear 53153->54802 53156 419f13 53154->53156 54803 41a179 VariantClear 53154->54803 53156->52238 53158->52239 53159->52243 53160->52245 53164 43adb1 53161->53164 53162 43ae4e 53162->53083 53163 43ae2a IsDialogMessageW 53163->53162 53163->53164 53164->53162 53164->53163 53165 43ade4 GetClassNameW 53164->53165 53165->53163 53165->53164 53167 4195cb 53166->53167 53184 418f8b 53166->53184 53168 4195d9 MessageBoxA 53167->53168 53170 4195d5 53167->53170 53169 44e9ed 73 API calls 53168->53169 53169->53170 53171 41966f 53170->53171 53172 419638 53170->53172 53216 407480 74 API calls 53170->53216 53173 419682 53171->53173 53171->53184 53218 407480 74 API calls 53171->53218 53172->53171 53217 407480 74 API calls 53172->53217 53176 429f8a 74 API calls 53173->53176 53177 4196a8 53176->53177 53179 4196b8 53177->53179 53219 407480 74 API calls 53177->53219 53181 40e441 73 API calls 53179->53181 53182 4196d3 53181->53182 53220 419f26 450 API calls ctype 53182->53220 53184->53089 53184->53090 53185 419536 450 API calls 53184->53185 53185->53092 53186->53094 53187->53098 53189 437916 Sleep 53188->53189 53190 4378fb 53188->53190 53191 43796b 53189->53191 53192 437928 timeGetTime 53189->53192 53190->53189 53204 43790f 53190->53204 53194 437976 53191->53194 53195 4379a4 53191->53195 53193 437938 53192->53193 53193->53191 53199 437947 53193->53199 53197 437999 53194->53197 53198 437979 53194->53198 53196 437a84 158 API calls 53195->53196 53205 437986 53196->53205 53223 437a84 53197->53223 53201 437990 53198->53201 53202 43797c 53198->53202 53199->53204 53209 4101fc VariantClear 53199->53209 53222 437c5d 159 API calls 53201->53222 53202->53204 53207 43797f 53202->53207 53204->53089 53206 43798c 53205->53206 53213 4101fc VariantClear 53205->53213 53206->53204 53211 43798e 53206->53211 53221 437c5d 159 API calls 53207->53221 53208 437997 53208->53205 53209->53204 53236 40d649 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 53211->53236 53213->53206 53214->53096 53215->53104 53216->53172 53217->53172 53218->53173 53219->53179 53220->53184 53221->53205 53222->53208 53224 437a99 ctype 53223->53224 53225 437aa2 53224->53225 53226 437add 53224->53226 53228 437aad IsWindow 53225->53228 53237 40fc63 53226->53237 53230 437abb 53228->53230 53235 437ad4 53228->53235 53326 40306a 73 API calls 53230->53326 53233 437ac9 53327 427c0d 73 API calls 53233->53327 53235->53205 53236->53204 53238 40fc6c 53237->53238 53239 40fc7e 53238->53239 53328 40fea7 109 API calls 5 library calls 53238->53328 53241 403c2f 53239->53241 53242 403c40 ctype 53241->53242 53243 40e441 73 API calls 53242->53243 53244 403c64 53243->53244 53245 40e441 73 API calls 53244->53245 53246 403c6f 53245->53246 53247 40e46d 73 API calls 53246->53247 53248 403c7c 53247->53248 53249 40e2de 73 API calls 53248->53249 53250 403cb2 53249->53250 53251 403cd3 53250->53251 53338 403886 111 API calls 2 library calls 53250->53338 53253 403d18 53251->53253 53255 403ce4 GetForegroundWindow 53251->53255 53254 40e30a 73 API calls 53253->53254 53339 40306a 73 API calls 53255->53339 53326->53233 53327->53235 53328->53239 53338->53251 53355 41a222 MessageBoxA 53354->53355 53356 41a24e 53354->53356 53357 44e9ed 73 API calls 53355->53357 53356->53109 53358 41a23d 53357->53358 53358->53109 53360 41a21d 74 API calls 53359->53360 53361 429ff9 53360->53361 53362 429f8a 74 API calls 53361->53362 53363 42a018 53362->53363 53364 42a030 53363->53364 53365 42a01f 53363->53365 53366 41a21d 74 API calls 53364->53366 53595 42a7d5 450 API calls 2 library calls 53365->53595 53369 42a037 53366->53369 53368 42a02b 53368->53121 53370 41a21d 74 API calls 53369->53370 53371 42a07e 53370->53371 53383 42a084 53371->53383 53581 429f28 53371->53581 53374 40fb8e ctype VariantClear 53375 42a7c0 53374->53375 53707 40f330 VariantClear ctype 53375->53707 53377 42a2ef 53379 42a318 53377->53379 53377->53383 53378 41a21d 74 API calls 53404 42a0ab 53378->53404 53589 40e114 53379->53589 53381 4101fc VariantClear 53381->53404 53382 4101fc VariantClear 53386 42a4f9 53382->53386 53706 4187cb 115 API calls 4 library calls 53383->53706 53387 419eca 450 API calls 53386->53387 53388 42a52c 53387->53388 53389 42a539 53388->53389 53390 42a73e 53388->53390 53393 410048 77 API calls 53389->53393 53392 4101fc VariantClear 53390->53392 53391 42a3a4 53395 41a21d 74 API calls 53391->53395 53399 42a551 53392->53399 53396 42a542 53393->53396 53394 405aa7 74 API calls 53402 42a325 53394->53402 53395->53383 53397 4101fc VariantClear 53396->53397 53397->53399 53398 40e30a 73 API calls 53398->53404 53704 40e16e VariantClear 53399->53704 53400 40e0b7 74 API calls 53400->53404 53401 42a3de 53406 41a21d 74 API calls 53401->53406 53402->53394 53405 40e30a 73 API calls 53402->53405 53407 4074e3 73 API calls 53402->53407 53410 41a21d 74 API calls 53402->53410 53418 42f0bb 450 API calls 53402->53418 53419 40e27c 74 API calls 53402->53419 53422 42a4da 53402->53422 53424 42a70e 53402->53424 53428 40f7d3 77 API calls 53402->53428 53702 40f866 73 API calls 53402->53702 53404->53377 53404->53378 53404->53381 53404->53383 53404->53391 53404->53398 53404->53400 53404->53401 53412 42a3ae 53404->53412 53415 42a3c8 53404->53415 53416 4108d2 VariantClear 53404->53416 53420 40f34f 76 API calls 53404->53420 53429 42a727 53404->53429 53596 42e4b9 450 API calls ctype 53404->53596 53597 42dc0d 74 API calls 53404->53597 53598 42f0bb 53404->53598 53405->53402 53406->53402 53407->53402 53408 42a78a 53409 40fb8e ctype VariantClear 53408->53409 53411 42a79d 53409->53411 53410->53402 53413 41a21d 74 API calls 53412->53413 53413->53383 53417 41a21d 74 API calls 53415->53417 53416->53404 53417->53383 53418->53402 53419->53402 53420->53404 53422->53382 53425 41a21d 74 API calls 53424->53425 53426 42a71b 53425->53426 53703 4187cb 115 API calls 4 library calls 53426->53703 53428->53402 53429->53374 53431 41a21d 74 API calls 53430->53431 53432 42a8ee 53431->53432 53433 40e30a 73 API calls 53432->53433 53434 42a8f8 53433->53434 53435 40e0b7 74 API calls 53434->53435 53436 42a910 53435->53436 53437 42aa23 53436->53437 53439 42a941 53436->53439 53440 42a925 53436->53440 53438 41a21d 74 API calls 53437->53438 53463 42aa2d 53438->53463 53442 41a21d 74 API calls 53439->53442 53441 41a21d 74 API calls 53440->53441 53444 42a92c 53441->53444 53445 42a949 53442->53445 53443 42aa58 53446 42f0bb 450 API calls 53443->53446 53921 4187cb 115 API calls 4 library calls 53444->53921 53447 42a96a 53445->53447 53451 42a955 53445->53451 53452 42a9bd 53445->53452 53450 42aa8a 53446->53450 53448 41a21d 74 API calls 53447->53448 53465 42a93c 53447->53465 53455 42a97f 53448->53455 53456 42aab9 53450->53456 53460 41a21d 74 API calls 53450->53460 53922 40fae0 76 API calls 53451->53922 53454 41a21d 74 API calls 53452->53454 53454->53444 53458 42a9d1 53455->53458 53464 42a98b 53455->53464 53459 40fb8e ctype VariantClear 53456->53459 53457 42a95a 53923 42e4b9 450 API calls ctype 53457->53923 53458->53437 53468 41a21d 74 API calls 53458->53468 53459->53465 53461 42aa9c 53460->53461 53466 42aaa2 53461->53466 53467 42aabe 53461->53467 53463->53443 53469 41a21d 74 API calls 53463->53469 53924 4284b9 149 API calls ctype 53464->53924 53465->53128 53471 41a21d 74 API calls 53466->53471 53473 42ab10 53467->53473 53474 42aac4 53467->53474 53472 42a9e1 53468->53472 53469->53443 53476 42aaac 53471->53476 53477 42a9f7 53472->53477 53482 41a21d 74 API calls 53472->53482 53478 42ab17 53473->53478 53479 42ab65 53473->53479 53480 42aafe 53474->53480 53486 42aad4 53474->53486 53475 42a9a2 53475->53465 53488 41a21d 74 API calls 53475->53488 53926 4187cb 115 API calls 4 library calls 53476->53926 53925 42ad16 450 API calls ctype 53477->53925 53483 42ab59 53478->53483 53484 42ab1c 53478->53484 53487 410048 77 API calls 53479->53487 53481 41a21d 74 API calls 53480->53481 53481->53476 53490 42a9f1 53482->53490 53932 4108eb 106 API calls 2 library calls 53483->53932 53492 42ab1f 53484->53492 53493 42ab4d 53484->53493 53495 42aae5 53486->53495 53927 40e27c 74 API calls 53486->53927 53487->53456 53488->53444 53490->53437 53490->53477 53497 42ab22 53492->53497 53498 42ab40 53492->53498 53931 410a59 96 API calls ctype 53493->53931 53494 42aa04 53494->53465 53504 41a21d 74 API calls 53494->53504 53500 40f7d3 77 API calls 53495->53500 53502 42ab34 53497->53502 53503 42ab25 53497->53503 53930 410c02 96 API calls ctype 53498->53930 53500->53456 53929 410b48 96 API calls 2 library calls 53502->53929 53503->53456 53928 41138a 110 API calls 53503->53928 53504->53444 53508 41a21d 74 API calls 53507->53508 53509 429d9d 53508->53509 53510 41a21d 74 API calls 53509->53510 53511 429da8 53510->53511 53933 429e1c 53511->53933 53514 429e0b 53975 40f330 VariantClear ctype 53514->53975 53515 429dff 53974 4187cb 115 API calls 4 library calls 53515->53974 53517 429de1 53957 419041 53517->53957 53519 429dfb 53519->53121 53522 429df6 53973 40f330 VariantClear ctype 53522->53973 53525 41a21d 74 API calls 53524->53525 53526 42af68 53525->53526 53527 42b0fb 53526->53527 53529 42b042 53526->53529 53530 42afc7 53526->53530 53531 42b075 53526->53531 53532 42af89 53526->53532 53533 42b009 53526->53533 53534 42b052 53526->53534 53535 42b093 53526->53535 53536 42afd5 53526->53536 53537 42b015 53526->53537 53538 42b0e2 53526->53538 53539 42afe3 53526->53539 53540 42b063 53526->53540 53541 42b020 53526->53541 53542 42b0a0 53526->53542 53543 42af96 53526->53543 53544 42afae 53526->53544 53545 42afee 53526->53545 53546 42b0ee 53526->53546 53547 42b0b4 53526->53547 53548 42b035 53526->53548 53549 42afba 53526->53549 53550 42affc 53526->53550 53551 42af7d 53526->53551 53577 42af84 53526->53577 54788 4187cb 115 API calls 4 library calls 53527->54788 54780 42c43d 121 API calls ctype 53529->54780 54771 42b622 450 API calls ctype 53530->54771 54783 42c676 450 API calls ctype 53531->54783 54767 42dc99 74 API calls 53532->54767 54776 42be87 179 API calls ctype 53533->54776 54781 42d9fa 450 API calls ctype 53534->54781 54784 42d1db 450 API calls ctype 53535->54784 54772 42b71c 450 API calls ctype 53536->54772 54777 42bfb3 450 API calls ctype 53537->54777 54786 42c5a3 450 API calls 53538->54786 54773 42b81a 78 API calls ctype 53539->54773 54782 42cc85 450 API calls ctype 53540->54782 54778 42dc99 74 API calls 53541->54778 54785 42d130 450 API calls ctype 53542->54785 54768 41a179 VariantClear 53543->54768 54769 42b4af 450 API calls ctype 53544->54769 54774 42b8de 450 API calls 53545->54774 54787 42c633 117 API calls 53546->54787 53568 41a21d 74 API calls 53547->53568 54779 42c17f 450 API calls ctype 53548->54779 54770 42b5cb 450 API calls 53549->54770 54775 42b959 450 API calls ctype 53550->54775 54728 42b1a6 53551->54728 53574 42b0c1 53568->53574 53576 429f8a 74 API calls 53574->53576 53576->53577 53577->53128 53578->53139 53579->53128 53580->53124 53583 429f31 53581->53583 53582 41a21d 74 API calls 53582->53583 53583->53582 53584 429f4c 53583->53584 53585 429f67 53583->53585 53586 41a21d 74 API calls 53584->53586 53585->53404 53587 429f59 53586->53587 53708 4187cb 115 API calls 4 library calls 53587->53708 53590 40e135 53589->53590 53593 40e126 53589->53593 53591 44e9ed 73 API calls 53590->53591 53591->53593 53709 40f724 53593->53709 53594 40e16b 53594->53402 53595->53368 53596->53404 53597->53404 53599 42f0d6 53598->53599 53600 42f0f9 53598->53600 53763 44f408 72 API calls __cinit 53599->53763 53717 42dcea 53600->53717 53604 41a21d 74 API calls 53640 42f14f 53604->53640 53605 42dcea 73 API calls 53605->53640 53606 42fa38 53608 42fa3f 53606->53608 53635 42fa7e 53606->53635 53607 42dd54 74 API calls 53607->53640 53788 4187cb 115 API calls 4 library calls 53608->53788 53609 42f7a8 53780 4187cb 115 API calls 4 library calls 53609->53780 53610 42fa0a 53787 4187cb 115 API calls 4 library calls 53610->53787 53614 42f262 53614->53404 53615 42f9dc 53786 4187cb 115 API calls 4 library calls 53615->53786 53616 41a21d 74 API calls 53616->53640 53617 42fa17 53617->53614 53626 40fb8e ctype VariantClear 53617->53626 53618 42fa4c 53618->53614 53629 40fb8e ctype VariantClear 53618->53629 53619 42f7b5 53619->53614 53630 40fb8e ctype VariantClear 53619->53630 53620 40fb8e ctype VariantClear 53620->53635 53622 42f7fc 53781 4187cb 115 API calls 4 library calls 53622->53781 53624 42f9e9 53624->53614 53636 40fb8e ctype VariantClear 53624->53636 53625 40f93c 76 API calls 53625->53640 53626->53617 53627 40ea97 77 API calls 53627->53640 53628 42faa1 53789 4187cb 115 API calls 4 library calls 53628->53789 53629->53618 53630->53619 53631 42f809 53631->53614 53639 40fb8e ctype VariantClear 53631->53639 53633 429fd7 450 API calls 53633->53640 53634 42fb83 147 API calls 53634->53640 53635->53614 53635->53620 53636->53624 53637 42f957 53642 41a21d 74 API calls 53637->53642 53639->53631 53640->53605 53640->53606 53640->53607 53640->53609 53640->53610 53640->53615 53640->53616 53640->53622 53640->53625 53640->53627 53640->53628 53640->53633 53640->53634 53640->53637 53644 42fad6 53640->53644 53645 429d78 450 API calls 53640->53645 53649 42f91a 53640->53649 53653 40eb54 74 API calls 53640->53653 53658 42f997 53640->53658 53659 42f49d 53640->53659 53660 4101fc VariantClear 53640->53660 53661 42f678 53640->53661 53662 40e2de 73 API calls 53640->53662 53666 42fb0b 53640->53666 53675 42f348 53640->53675 53676 40e46d 73 API calls 53640->53676 53678 40fb8e VariantClear ctype 53640->53678 53679 40e30a 73 API calls 53640->53679 53690 41086d VariantClear 53640->53690 53691 42f223 53640->53691 53721 42e5d8 53640->53721 53765 4102a8 VariantClear ctype 53640->53765 53766 41026f VariantClear ctype 53640->53766 53767 410886 74 API calls ctype 53640->53767 53768 42e118 450 API calls 2 library calls 53640->53768 53769 4102c1 53640->53769 53776 42dd83 111 API calls 53640->53776 53777 42deca 164 API calls ctype 53640->53777 53778 4284b9 149 API calls ctype 53640->53778 53779 42e2c4 450 API calls ctype 53640->53779 53782 43004b 74 API calls 53640->53782 53643 42f960 53642->53643 53784 4187cb 115 API calls 4 library calls 53643->53784 53790 4187cb 115 API calls 4 library calls 53644->53790 53645->53640 53646 40fb8e ctype VariantClear 53651 42faae 53646->53651 53657 41a21d 74 API calls 53649->53657 53651->53614 53651->53646 53653->53640 53655 40fb8e ctype VariantClear 53655->53659 53656 40fb8e ctype VariantClear 53656->53661 53663 42f924 53657->53663 53668 41a21d 74 API calls 53658->53668 53659->53614 53659->53655 53660->53640 53661->53614 53661->53656 53662->53640 53783 4187cb 115 API calls 4 library calls 53663->53783 53664 40fb8e ctype VariantClear 53671 42f96f 53664->53671 53791 4187cb 115 API calls 4 library calls 53666->53791 53667 40fb8e ctype VariantClear 53672 42fae3 53667->53672 53673 42f9a1 53668->53673 53670 40fb8e ctype VariantClear 53670->53675 53671->53614 53671->53664 53672->53614 53672->53667 53785 4187cb 115 API calls 4 library calls 53673->53785 53675->53614 53675->53670 53676->53640 53678->53640 53679->53640 53681 42fb1a 53683 40fb8e ctype VariantClear 53681->53683 53682 42f9ab 53688 40fb8e ctype VariantClear 53682->53688 53694 42fb23 53683->53694 53685 40fb8e ctype VariantClear 53689 42f92f 53685->53689 53698 42f9b4 53688->53698 53689->53614 53689->53685 53690->53640 53695 41a21d 74 API calls 53691->53695 53692 40fb8e ctype VariantClear 53692->53694 53693 40fb8e ctype VariantClear 53693->53698 53694->53614 53694->53692 53697 42f22e 53695->53697 53764 4187cb 115 API calls 4 library calls 53697->53764 53698->53614 53698->53693 53700 40fb8e ctype VariantClear 53701 42f23f 53700->53701 53701->53614 53701->53700 53702->53402 53703->53429 53704->53408 53706->53429 53707->53368 53708->53585 53710 40f730 53709->53710 53715 40f760 53709->53715 53711 40f73d 53710->53711 53712 40f724 VariantClear 53710->53712 53713 40f74c 53711->53713 53714 40f724 VariantClear 53711->53714 53712->53711 53713->53715 53716 40fb8e ctype VariantClear 53713->53716 53714->53713 53715->53594 53716->53715 53718 42dcfd 53717->53718 53719 42dcf0 53717->53719 53720 44e9ed 73 API calls 53718->53720 53719->53604 53720->53719 53722 42e605 _memset 53721->53722 53723 452f3f __time64 GetSystemTimeAsFileTime 53722->53723 53724 42e62f 53723->53724 53792 4538b7 53724->53792 53763->53600 53764->53701 53765->53640 53766->53640 53767->53640 53768->53640 53770 40fb8e ctype VariantClear 53769->53770 53771 4102c8 53770->53771 53772 44e9ed 73 API calls 53771->53772 53773 4102d6 53772->53773 53774 4102e7 53773->53774 53775 40e30a 73 API calls 53773->53775 53774->53640 53775->53774 53776->53640 53777->53640 53778->53640 53779->53640 53780->53619 53781->53631 53782->53640 53783->53689 53784->53671 53785->53682 53786->53624 53787->53617 53788->53618 53789->53651 53790->53672 53791->53681 53805 45e482 53792->53805 53862 454b7a GetLastError 53805->53862 53863 454a33 ___getgmtimebuf 62 API calls 53862->53863 53864 454b8f 53863->53864 53921->53465 53922->53457 53923->53447 53924->53475 53925->53494 53926->53456 53927->53495 53928->53456 53929->53456 53930->53456 53931->53456 53932->53456 53934 41a21d 74 API calls 53933->53934 53935 429e31 53934->53935 53936 429e56 53935->53936 53937 429e39 53935->53937 53939 429f28 116 API calls 53936->53939 53938 41a21d 74 API calls 53937->53938 53940 429e41 53938->53940 53950 429e6c 53939->53950 53984 4187cb 115 API calls 4 library calls 53940->53984 53944 42f0bb 450 API calls 53944->53950 53945 40fb8e ctype VariantClear 53949 429dc0 53945->53949 53946 429f08 53947 40fb8e ctype VariantClear 53946->53947 53947->53949 53948 41a21d 74 API calls 53948->53950 53949->53514 53949->53515 53949->53517 53950->53944 53950->53946 53950->53948 53950->53949 53951 429f12 53950->53951 53954 40fb8e ctype VariantClear 53950->53954 53956 429efb 53950->53956 53976 40f34f 53950->53976 53985 42dc0d 74 API calls 53950->53985 53952 41a21d 74 API calls 53951->53952 53953 429f19 53952->53953 53986 4187cb 115 API calls 4 library calls 53953->53986 53954->53950 53956->53945 53958 4101fc VariantClear 53957->53958 53959 41904e 53958->53959 53988 41e59e 53959->53988 54028 41a38c 53959->54028 54051 4342b8 53959->54051 54118 40c488 53959->54118 54121 41a2f7 53959->54121 54143 41c4a7 53959->54143 54179 434645 53959->54179 54300 41dbd4 53959->54300 54333 438106 53959->54333 54348 41d6d5 53959->54348 54412 4301f0 53959->54412 54427 434cf0 53959->54427 53960 41908b 53960->53514 53960->53522 53973->53519 53974->53514 53975->53519 53977 40f357 53976->53977 53983 40f385 53976->53983 53980 44e9ed 73 API calls 53977->53980 53978 44e9ed 73 API calls 53979 40f3c1 53978->53979 53981 40f3d2 53979->53981 53987 40f93c 76 API calls _memcpy_s 53979->53987 53980->53983 53981->53950 53983->53978 53984->53949 53985->53950 53986->53956 53987->53981 53989 41e5bc 53988->53989 54026 41e661 53988->54026 53991 405aa7 74 API calls 53989->53991 53990 405aa7 74 API calls 53992 41e684 53990->53992 53993 41e5c6 53991->53993 53994 40fc41 109 API calls 53992->53994 53995 40fd19 95 API calls 53993->53995 53996 41e68b 53994->53996 53997 41e5cb 53995->53997 53998 405aa7 74 API calls 53996->53998 54000 405aa7 74 API calls 53997->54000 53999 41e695 53998->53999 54002 40fc41 109 API calls 53999->54002 54001 41e5dd 54000->54001 54003 40fd19 95 API calls 54001->54003 54004 41e69c 54002->54004 54005 41e5e2 54003->54005 54475 40c78e 54004->54475 54008 405aa7 74 API calls 54005->54008 54005->54026 54010 41e604 54008->54010 54009 41e668 54009->53960 54012 40fc41 109 API calls 54010->54012 54013 41e60b 54012->54013 54014 4514e8 65 API calls 54013->54014 54026->53990 54026->54009 54029 405aa7 74 API calls 54028->54029 54030 41a3a3 54029->54030 54031 40fc41 109 API calls 54030->54031 54032 41a3aa 54031->54032 54033 40c4db 74 API calls 54032->54033 54034 41a3b6 54033->54034 54035 405aa7 74 API calls 54034->54035 54036 41a3c8 54035->54036 54037 40fc41 109 API calls 54036->54037 54038 41a3cf 54037->54038 54039 405aa7 74 API calls 54038->54039 54040 41a3da 54039->54040 54041 40fc41 109 API calls 54040->54041 54042 41a3e1 54041->54042 54052 4342c8 54051->54052 54053 40e2de 73 API calls 54052->54053 54054 4342de 54053->54054 54055 40e2de 73 API calls 54054->54055 54056 4342e7 54055->54056 54057 40e2de 73 API calls 54056->54057 54058 4342f0 54057->54058 54059 4102c1 74 API calls 54058->54059 54060 4342fd 54059->54060 54061 405aa7 74 API calls 54060->54061 54062 434317 54061->54062 54063 40fc41 109 API calls 54062->54063 54064 43431e 54063->54064 54065 40e30a 73 API calls 54064->54065 54582 40c49d GetFileAttributesW 54118->54582 54122 41a304 54121->54122 54123 405aa7 74 API calls 54122->54123 54124 41a312 54123->54124 54125 40fc41 109 API calls 54124->54125 54126 41a319 54125->54126 54127 40c4db 74 API calls 54126->54127 54128 41a325 54127->54128 54129 405aa7 74 API calls 54128->54129 54130 41a343 54129->54130 54131 40fc41 109 API calls 54130->54131 54132 41a34a 54131->54132 54133 405aa7 74 API calls 54132->54133 54134 41a355 54133->54134 54135 40fc41 109 API calls 54134->54135 54144 4102c1 74 API calls 54143->54144 54145 41c4c7 54144->54145 54146 405aa7 74 API calls 54145->54146 54147 41c4d1 54146->54147 54148 40fc63 109 API calls 54147->54148 54149 41c4d8 54148->54149 54150 40e37d 73 API calls 54149->54150 54151 41c4e2 CharLowerBuffW 54150->54151 54152 40e30a 73 API calls 54151->54152 54153 41c4fb 54152->54153 54154 40e30a 73 API calls 54153->54154 54156 41c514 _wcscpy 54153->54156 54157 41c528 54154->54157 54158 40e505 73 API calls 54156->54158 54161 41c677 54156->54161 54165 41c6d4 54156->54165 54586 40e4a2 54156->54586 54157->54156 54160 40e30a 73 API calls 54157->54160 54159 41c63c GetDriveTypeW 54158->54159 54159->54156 54163 41c555 54160->54163 54162 4114ee 74 API calls 54161->54162 54161->54165 54164 41c68e 54162->54164 54163->54156 54167 40e30a 73 API calls 54163->54167 54166 41162a 74 API calls 54164->54166 54165->53960 54180 434652 54179->54180 54181 40e2de 73 API calls 54180->54181 54182 434664 54181->54182 54183 40e2de 73 API calls 54182->54183 54184 43466c 54183->54184 54185 40e2de 73 API calls 54184->54185 54186 434674 54185->54186 54187 405aa7 74 API calls 54186->54187 54201 434687 54186->54201 54188 4346a3 54187->54188 54190 40fc41 109 API calls 54188->54190 54189 4101fc VariantClear 54194 434a31 54189->54194 54191 4346aa 54190->54191 54192 40e30a 73 API calls 54191->54192 54193 4346b5 54192->54193 54195 433eaa 73 API calls 54193->54195 54194->53960 54201->54189 54301 405aa7 74 API calls 54300->54301 54302 41dbfa 54301->54302 54303 40fc41 109 API calls 54302->54303 54304 41dc01 54303->54304 54305 405aa7 74 API calls 54304->54305 54311 41dc1b 54304->54311 54306 41dc16 54305->54306 54307 40fd19 95 API calls 54306->54307 54307->54311 54308 405aa7 74 API calls 54309 41dced 54308->54309 54310 40fc41 109 API calls 54309->54310 54312 41dcf4 _wcsncpy 54310->54312 54311->54308 54318 41dd8b 54311->54318 54313 40c4db 74 API calls 54312->54313 54314 41dd1d 54313->54314 54315 4514e8 65 API calls 54314->54315 54316 41dd41 _wcscat 54315->54316 54317 41dd67 GetCurrentDirectoryW SetCurrentDirectoryW 54316->54317 54317->54318 54322 4101fc VariantClear 54318->54322 54325 41dd97 54322->54325 54325->53960 54606 4379ee 54333->54606 54336 437a84 158 API calls 54337 438120 54336->54337 54338 438140 54337->54338 54339 438124 54337->54339 54340 40e2de 73 API calls 54338->54340 54341 4101fc VariantClear 54339->54341 54342 438149 54340->54342 54343 43813d 54341->54343 54620 403713 75 API calls 54342->54620 54343->53960 54349 41d6fe 54348->54349 54350 41d6ef 54348->54350 54353 40e30a 73 API calls 54349->54353 54351 405aa7 74 API calls 54350->54351 54352 41d6f9 54351->54352 54354 40fd19 95 API calls 54352->54354 54355 41d717 54353->54355 54354->54349 54356 405aa7 74 API calls 54355->54356 54357 41d720 54356->54357 54358 40fc63 109 API calls 54357->54358 54359 41d727 54358->54359 54360 41d754 54359->54360 54361 41d858 54359->54361 54375 41d823 54359->54375 54362 405aa7 74 API calls 54360->54362 54363 412a2c 176 API calls 54361->54363 54364 41d75d 54362->54364 54365 41d866 54363->54365 54368 40fc41 109 API calls 54364->54368 54366 41d87c 54365->54366 54367 41d81b 54365->54367 54369 405aa7 74 API calls 54366->54369 54373 4101fc VariantClear 54367->54373 54372 41d764 _wcscpy _wcschr 54368->54372 54370 41d8a3 54369->54370 54371 40fc41 109 API calls 54370->54371 54380 41d786 _wcscat _wcscpy 54372->54380 54387 41d7bc _wcscat 54372->54387 54373->54375 54375->53960 54377 405aa7 74 API calls 54382 405aa7 74 API calls 54380->54382 54387->54377 54413 405aa7 74 API calls 54412->54413 54414 43020c 54413->54414 54415 40fc41 109 API calls 54414->54415 54416 430213 54415->54416 54666 40bc63 54416->54666 54419 430222 54674 4187cb 115 API calls 4 library calls 54419->54674 54420 430235 54422 43023a 54420->54422 54423 430259 54420->54423 54675 4102a8 VariantClear ctype 54422->54675 54424 4101fc VariantClear 54423->54424 54425 430230 54424->54425 54425->53960 54428 40e2de 73 API calls 54427->54428 54429 434d13 54428->54429 54430 40e2de 73 API calls 54429->54430 54431 434d1b 54430->54431 54432 40e2de 73 API calls 54431->54432 54433 434d23 54432->54433 54434 4102c1 74 API calls 54433->54434 54435 434d30 54434->54435 54436 405aa7 74 API calls 54435->54436 54437 434d46 54436->54437 54438 40fc41 109 API calls 54437->54438 54439 434d4d 54438->54439 54440 40e30a 73 API calls 54439->54440 54441 434d58 54440->54441 54476 40c79e 54475->54476 54477 40c4db 74 API calls 54476->54477 54478 40c7b2 54477->54478 54479 40c4db 74 API calls 54478->54479 54480 40c7c2 54479->54480 54583 40c4b7 FindFirstFileW 54582->54583 54584 40c491 54582->54584 54583->54584 54585 40c4cd FindClose 54583->54585 54584->53960 54585->54584 54587 40e3fd 73 API calls 54586->54587 54588 40e4b1 54587->54588 54588->54156 54607 405aa7 74 API calls 54606->54607 54608 4379fb 54607->54608 54609 410048 77 API calls 54608->54609 54610 437a07 54609->54610 54611 437a2f 54610->54611 54612 437a0d 54610->54612 54613 40e46d 73 API calls 54611->54613 54614 405aa7 74 API calls 54612->54614 54615 437a2d 54613->54615 54616 437a17 54614->54616 54615->54336 54617 40fc63 109 API calls 54616->54617 54618 437a1e 54617->54618 54619 40e441 73 API calls 54618->54619 54619->54615 54667 40bc72 __wtof_l 54666->54667 54668 40bc98 54666->54668 54667->54668 54669 40bc89 54667->54669 54709 40be51 120 API calls 2 library calls 54668->54709 54676 40bcaa 54669->54676 54672 40bca4 54673 40bc94 54672->54673 54673->54419 54673->54420 54674->54425 54675->54425 54710 40d9e9 54676->54710 54679 40be3d 54680 40be42 FreeLibrary 54679->54680 54705 40be1d 54679->54705 54680->54705 54683 40be2f 54683->54679 54685 40be34 FreeLibrary 54683->54685 54685->54679 54705->54673 54709->54672 54711 40bcd1 54710->54711 54712 40d9ef LoadLibraryA 54710->54712 54711->54679 54714 40da18 54711->54714 54712->54711 54713 40da00 GetProcAddress 54712->54713 54713->54711 54715 40bce1 54714->54715 54716 40da1e LoadLibraryA 54714->54716 54715->54683 54718 40da47 54715->54718 54716->54715 54717 40da2f GetProcAddress 54716->54717 54717->54715 54719 40bcf1 54718->54719 54720 40da4d LoadLibraryA 54718->54720 54720->54719 54721 40da5e GetProcAddress 54720->54721 54721->54719 54789 42f06c 54728->54789 54731 41a21d 74 API calls 54732 42b1da 54731->54732 54733 42b48e 54732->54733 54734 41a21d 74 API calls 54732->54734 54735 41a21d 74 API calls 54733->54735 54736 42b1f0 54734->54736 54737 42b499 54735->54737 54736->54733 54738 42b1f9 54736->54738 54798 4187cb 115 API calls 4 library calls 54737->54798 54740 41a21d 74 API calls 54738->54740 54741 42b207 54740->54741 54746 42b276 54741->54746 54750 42b20d 54741->54750 54742 41a21d 74 API calls 54742->54750 54743 42b250 54747 41a21d 74 API calls 54743->54747 54744 42b420 54796 42dc3f 77 API calls 54744->54796 54746->54744 54749 42b437 54746->54749 54760 42f06c 450 API calls 54746->54760 54761 42b453 54746->54761 54763 42b44c 54746->54763 54764 41a21d 74 API calls 54746->54764 54765 42b439 54746->54765 54748 42b255 54747->54748 54795 4074e3 73 API calls 54748->54795 54754 40fb8e ctype VariantClear 54749->54754 54750->54742 54750->54743 54757 42b26a 54750->54757 54794 4074e3 73 API calls 54750->54794 54753 42b25e 54755 429c2b 450 API calls 54753->54755 54756 42b484 54754->54756 54755->54757 54758 40fb8e ctype VariantClear 54756->54758 54757->53577 54758->54757 54760->54746 54762 41a21d 74 API calls 54761->54762 54762->54763 54797 4187cb 115 API calls 4 library calls 54763->54797 54764->54746 54766 41a21d 74 API calls 54765->54766 54766->54763 54767->53543 54768->53577 54769->53577 54770->53577 54771->53577 54772->53577 54773->53577 54774->53577 54775->53577 54776->53577 54777->53577 54778->53577 54779->53577 54780->53577 54781->53577 54782->53577 54783->53577 54784->53577 54785->53577 54786->53577 54787->53577 54788->53577 54790 42f0bb 450 API calls 54789->54790 54791 42f092 54790->54791 54792 40fb8e ctype VariantClear 54791->54792 54793 42b1c7 54792->54793 54793->54731 54793->54757 54794->54750 54795->54753 54796->54749 54797->54749 54798->54757 54800 40f5fa CharUpperBuffW 54799->54800 54801 40f5e6 54799->54801 54800->54801 54801->53147 54802->53154 54803->53154 54804 437c98 54805 4379ee 114 API calls 54804->54805 54806 437ca4 54805->54806 54807 437a84 158 API calls 54806->54807 54809 437cad 54807->54809 54808 437ccb 54809->54808 54810 4101fc VariantClear 54809->54810 54810->54808 54811 465ecb 54816 409b18 54811->54816 54815 465eda 54817 409b40 54816->54817 54818 40e2de 73 API calls 54817->54818 54820 409b4d _memset 54817->54820 54818->54817 54819 409ba3 54822 44f408 72 API calls __cinit 54819->54822 54820->54819 54821 409b7c CreateIcon 54820->54821 54821->54819 54822->54815 54823 45a04b 54824 45a087 54823->54824 54860 45a080 54823->54860 54825 45a0b2 54824->54825 54826 45a08b 54824->54826 54831 45a11c 54825->54831 54832 45a0f6 54825->54832 54898 45508f 65 API calls ___getgmtimebuf 54826->54898 54829 45a090 54899 45507c 65 API calls ___getgmtimebuf 54829->54899 54830 45a609 54833 45a131 54831->54833 54834 45a122 54831->54834 54901 45508f 65 API calls ___getgmtimebuf 54832->54901 54888 460f66 54833->54888 54904 460d86 67 API calls 3 library calls 54834->54904 54838 45a097 54900 45501d 65 API calls 2 library calls 54838->54900 54840 45a0fb 54902 45507c 65 API calls ___getgmtimebuf 54840->54902 54841 45a12e 54841->54833 54843 45a137 54845 45a336 54843->54845 54905 454bf1 54843->54905 54847 45a344 54845->54847 54848 45a569 WriteFile 54845->54848 54846 45a104 54903 45501d 65 API calls 2 library calls 54846->54903 54850 45a3e7 54847->54850 54851 45a356 54847->54851 54852 45a584 54848->54852 54853 45a590 GetLastError 54848->54853 54855 45a3f1 54850->54855 54856 45a48e 54850->54856 54857 45a5ca 54851->54857 54861 45a3a1 WriteFile 54851->54861 54852->54857 54852->54860 54869 45a5aa 54852->54869 54853->54852 54855->54857 54865 45a444 WriteFile 54855->54865 54856->54857 54868 45a4e4 WideCharToMultiByte 54856->54868 54857->54860 54913 45507c 65 API calls ___getgmtimebuf 54857->54913 54915 460147 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess __invoke_watson 54860->54915 54861->54853 54867 45a3c6 54861->54867 54863 45a184 GetConsoleCP 54863->54852 54882 45a1a4 54863->54882 54864 45a176 54864->54845 54864->54863 54865->54853 54871 45a469 54865->54871 54866 45a5b7 54914 45508f 65 API calls ___getgmtimebuf 54866->54914 54867->54851 54867->54852 54878 45a331 54867->54878 54868->54853 54870 45a517 WriteFile 54868->54870 54872 45a5b2 54869->54872 54873 45a5bf 54869->54873 54875 45a545 GetLastError 54870->54875 54880 45a53c 54870->54880 54871->54852 54871->54855 54871->54878 54911 45507c 65 API calls ___getgmtimebuf 54872->54911 54912 4550a2 65 API calls 3 library calls 54873->54912 54875->54880 54878->54852 54880->54852 54880->54856 54880->54870 54880->54878 54881 4610ed 77 API calls __write_nolock 54881->54882 54882->54852 54882->54878 54882->54881 54884 45a1ea 54882->54884 54910 44efb6 75 API calls __isleadbyte_l 54882->54910 54883 45a21c WideCharToMultiByte 54883->54852 54885 45a24a WriteFile 54883->54885 54884->54852 54884->54853 54884->54882 54884->54883 54886 462cbb 10 API calls __putwch_nolock 54884->54886 54887 45a283 WriteFile 54884->54887 54885->54853 54885->54884 54886->54884 54887->54853 54887->54884 54889 460f6f 54888->54889 54890 460f7d 54888->54890 54916 45507c 65 API calls ___getgmtimebuf 54889->54916 54892 460fa8 54890->54892 54917 45507c 65 API calls ___getgmtimebuf 54890->54917 54892->54843 54894 460f74 54894->54843 54895 460f91 54918 45501d 65 API calls 2 library calls 54895->54918 54898->54829 54899->54838 54901->54840 54902->54846 54904->54841 54906 454b7a ___getgmtimebuf 65 API calls 54905->54906 54907 454bf7 54906->54907 54908 454c04 GetConsoleMode 54907->54908 54919 44ea57 65 API calls 3 library calls 54907->54919 54908->54845 54908->54864 54910->54882 54911->54866 54912->54860 54913->54866 54914->54860 54915->54830 54916->54894 54917->54895 54919->54908 54920 465ee8 54925 4060c8 54920->54925 54924 465ef7 54926 4060d5 54925->54926 54927 44e9ed 73 API calls 54926->54927 54928 406152 GetModuleFileNameW 54927->54928 54929 4514e8 65 API calls 54928->54929 54930 406188 _wcsncat 54929->54930 54942 45156f 54930->54942 54933 44e9ed 73 API calls 54934 4061c1 _wcscpy 54933->54934 54935 4061f1 RegOpenKeyExW 54934->54935 54936 406216 RegQueryValueExW 54935->54936 54937 40632f 54935->54937 54938 406326 RegCloseKey 54936->54938 54940 406240 _wcscat __wtof_l _wcsncpy 54936->54940 54941 44f408 72 API calls __cinit 54937->54941 54938->54937 54939 44e9ed 73 API calls 54939->54940 54940->54938 54940->54939 54941->54924 54945 458159 54942->54945 54946 45816d 54945->54946 54947 458168 54945->54947 54954 45507c 65 API calls ___getgmtimebuf 54946->54954 54947->54946 54948 45818d 54947->54948 54951 4061b6 54948->54951 54956 45507c 65 API calls ___getgmtimebuf 54948->54956 54951->54933 54953 458172 54955 45501d 65 API calls 2 library calls 54953->54955 54954->54953 54956->54953 54957 424ead 54958 405aa7 74 API calls 54957->54958 54959 424ebb 54958->54959 54960 40fd19 95 API calls 54959->54960 54961 424ec0 54960->54961 54962 424ec4 Sleep 54961->54962 54963 424ece timeGetTime 54961->54963 54964 424f16 54962->54964 54965 405aa7 74 API calls 54963->54965 54966 424ee5 54965->54966 54967 40fd19 95 API calls 54966->54967 54968 424eea 54967->54968 54969 424f03 54968->54969 54970 424ef7 SetProcessWorkingSetSize 54968->54970 54971 418d3c 450 API calls 54969->54971 54970->54969 54971->54964

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1027 4060c8-406210 call 453ed0 call 44e9ed GetModuleFileNameW call 4514e8 call 451532 call 45156f call 44e9ed call 44e973 RegOpenKeyExW 1042 406216-40623a RegQueryValueExW 1027->1042 1043 40632f-406338 1027->1043 1044 406240-406265 1042->1044 1045 406326-406329 RegCloseKey 1042->1045 1046 406268-406279 1044->1046 1045->1043 1047 406298-4062a7 call 44f00e 1046->1047 1048 40627b-40627f 1046->1048 1054 4062d4-40631b call 44e9ed call 45158d 1047->1054 1055 4062a9-4062bf call 44f00e 1047->1055 1048->1047 1049 406281-406293 call 44e949 1048->1049 1057 40631d-406321 1049->1057 1054->1045 1054->1057 1055->1054 1062 4062c1-4062d3 call 44e949 1055->1062 1057->1046 1062->1054
                                                                            APIs
                                                                              • Part of subcall function 0044E9ED: _malloc.LIBCMT ref: 0044EA05
                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00406166
                                                                            • _wcsncat.LIBCMT ref: 00406195
                                                                            • __makepath.LIBCMT ref: 004061B1
                                                                              • Part of subcall function 0045156F: __wmakepath_s.LIBCMT ref: 00451583
                                                                              • Part of subcall function 0044E9ED: std::exception::exception.LIBCMT ref: 0044EA3C
                                                                              • Part of subcall function 0044E9ED: __CxxThrowException@8.LIBCMT ref: 0044EA51
                                                                            • _wcscpy.LIBCMT ref: 004061EC
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00020019,?), ref: 00406208
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 00406232
                                                                            • _wcscat.LIBCMT ref: 0040628C
                                                                            • _wcscat.LIBCMT ref: 004062CD
                                                                            • _wcsncpy.LIBCMT ref: 00406306
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00406329
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$CloseException@8FileModuleNameOpenQueryThrowValue__makepath__wmakepath_s_malloc_wcscpy_wcsncat_wcsncpystd::exception::exception
                                                                            • String ID: <v@$Include$Software\AutoIt v3\AutoIt$\
                                                                            • API String ID: 3663597669-4126755141
                                                                            • Opcode ID: 5bf4ab24d776dbe09a2511fb973cb2f09b7e361b1c47bcd7bff25fbae2677942
                                                                            • Instruction ID: 7a0ec9e26652ebfc38452f8fd7d191dc43944444fa956801943b60db48f99f1d
                                                                            • Opcode Fuzzy Hash: 5bf4ab24d776dbe09a2511fb973cb2f09b7e361b1c47bcd7bff25fbae2677942
                                                                            • Instruction Fuzzy Hash: 846149B1D41208ABDB10EF99EC8599E77F8FB48304B5044BFE919E3291E7349A44CF58

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1147 40108c-4010c2 GetCurrentDirectoryW call 4013fe call 40e2b5 1152 4010c4-4010d8 MessageBoxA 1147->1152 1153 4010dd-4010e9 1147->1153 1154 4012b3-4012b7 1152->1154 1155 40110b-40111b call 406bfc 1153->1155 1156 4010eb-401109 call 4065b2 1153->1156 1160 401120-401122 1155->1160 1163 401159-401167 call 418bd1 1156->1163 1161 401133-401153 GetFullPathNameW 1160->1161 1162 401124-40112e 1160->1162 1161->1163 1164 4012a6-4012ad SetCurrentDirectoryW 1162->1164 1167 401169-40118a call 40677e SetCurrentDirectoryW 1163->1167 1168 40118f-401193 1163->1168 1164->1154 1167->1154 1170 401241-401252 call 4012ba call 40138d 1168->1170 1171 401199-4011a0 1168->1171 1181 401254-401259 call 409f5a 1170->1181 1182 40125e-401265 call 418d3c 1170->1182 1171->1170 1174 4011a6-4011ad call 40d99a 1171->1174 1174->1170 1180 4011b3-4011c7 GetModuleFileNameW 1174->1180 1183 4011c9-401215 call 40e30a call 40e505 * 2 GetForegroundWindow ShellExecuteW call 44e722 1180->1183 1184 40121a-40123f GetForegroundWindow ShellExecuteW 1180->1184 1181->1182 1190 40126a-401271 1182->1190 1186 40129c-4012a1 call 40677e 1183->1186 1184->1186 1186->1164 1190->1186 1193 401273 1190->1193 1195 401278-40127c 1193->1195 1197 401291-40129a 1195->1197 1198 40127e-401290 call 44e722 * 2 1195->1198 1197->1186 1197->1195 1198->1197
                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 004010AD
                                                                              • Part of subcall function 004013FE: GetModuleFileNameW.KERNEL32(00000000,C:\Windows\regsvr.exe,00000104,?,00000104), ref: 0040143E
                                                                              • Part of subcall function 004013FE: __wcsicmp.LIBCMT ref: 00401546
                                                                              • Part of subcall function 0040E2B5: GetModuleHandleA.KERNEL32(kernel32.dll,004010C0,?), ref: 0040E2BA
                                                                              • Part of subcall function 0040E2B5: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 0040E2CA
                                                                            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,0046BD8E,00000010), ref: 004010D2
                                                                            • SetCurrentDirectoryW.KERNEL32(?,C:\Windows\regsvr.exe), ref: 0040117A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectoryModule$AddressFileHandleMessageNameProc__wcsicmp
                                                                            • String ID: C:\Windows\regsvr.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                                                            • API String ID: 100587416-296733443
                                                                            • Opcode ID: bd84402bb592f3a432bd1753500ff229df93fbfa6d6369dd2acfe7eddafc8f2d
                                                                            • Instruction ID: a517a9db5f85c4c96bb8fc9c2871e4bd747f39243f1e7ce5074cf97865ffdd83
                                                                            • Opcode Fuzzy Hash: bd84402bb592f3a432bd1753500ff229df93fbfa6d6369dd2acfe7eddafc8f2d
                                                                            • Instruction Fuzzy Hash: 83510471904254AAEB10BBA59C05FAE7B78EB45308F0404BFF501B61E2D7BC89858B6E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1386 4130ce-4130d9 1387 4130dd-413115 call 4523ce call 412c26 call 451670 1386->1387 1394 413223 1387->1394 1395 41311b-4131e9 call 4523ce * 2 call 412c26 call 44e973 call 4523ce * 2 call 412c26 call 44e973 call 44ef27 1387->1395 1396 413227-41322b 1394->1396 1417 4131eb-413219 call 451d73 call 4523ce call 451d73 1395->1417 1418 41323a-41323c 1395->1418 1396->1387 1398 413231-413233 1396->1398 1400 413234-413237 1398->1400 1424 41321e-413221 1417->1424 1418->1400 1424->1396
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock$_fseek_wcscpy$__fseek_nolock
                                                                            • String ID: C:\Windows\regsvr.exe$FILE
                                                                            • API String ID: 1218644068-2691689167
                                                                            • Opcode ID: 719be1a034cf794bb3122aadce67e97502735f283ec2ee710fd14ffaf499a311
                                                                            • Instruction ID: 16955c187f1d51c9af23cef21f966cda246683522ea37d69e2bde0f0683897d4
                                                                            • Opcode Fuzzy Hash: 719be1a034cf794bb3122aadce67e97502735f283ec2ee710fd14ffaf499a311
                                                                            • Instruction Fuzzy Hash: 9A4186B2D40208BAEF21EBE1DC45FDE777DAF44304F1004ABBA44B2091E6B997988775
                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 004012C5
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004012D5
                                                                            • LoadIconW.USER32(000000A1), ref: 004012EF
                                                                            • LoadIconW.USER32(000000A4), ref: 00401301
                                                                            • RegisterClassExW.USER32(?), ref: 00401371
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$BrushClassColorCursorRegister
                                                                            • String ID: #$0$AutoIt v3$C:\Windows\regsvr.exe
                                                                            • API String ID: 1664269819-3841162646
                                                                            • Opcode ID: 79ae604c2ece932835a0c4772eb2b5c11f83d1a8ec0ef193ecd32122831a9563
                                                                            • Instruction ID: a4ae1f2f7a30b14d8864461e08ebee6a3adfffe902ce092d78f3296afce67af2
                                                                            • Opcode Fuzzy Hash: 79ae604c2ece932835a0c4772eb2b5c11f83d1a8ec0ef193ecd32122831a9563
                                                                            • Instruction Fuzzy Hash: 9F2136B1D04308AFDB009FA9EC88A9DBFB4FB88394F54053EE515A36A0D7B40944CF99
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 00433F9A: CharUpperBuffW.USER32(?,?,?,?,00000000), ref: 00433FAD
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00434373
                                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,HKCR\), ref: 004343A2
                                                                            • RegCloseKey.ADVAPI32(?), ref: 004343B6
                                                                            • RegQueryValueExW.KERNELBASE(?,00000000,00000000,?,00000000,00000000), ref: 004343E7
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000), ref: 0043446B
                                                                            • RegCloseKey.KERNELBASE(?,00000000), ref: 0043460E
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0043461A
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: Close$QueryValue$BuffCharConnectMessageOpenRegistryUpper
                                                                            • String ID:
                                                                            • API String ID: 4045058077-0
                                                                            • Opcode ID: 0d2fe836b71679359a26bf2ad7204aac9896725846f5c17a646dd5b41d0db2ee
                                                                            • Instruction ID: f6a981f66e00b1d264ff148d2bdbeb4e7af21c5c7377ee539f2df3d1dd7ffcb6
                                                                            • Opcode Fuzzy Hash: 0d2fe836b71679359a26bf2ad7204aac9896725846f5c17a646dd5b41d0db2ee
                                                                            • Instruction Fuzzy Hash: C7A19D72508205AFC710EF65C8819AFB3ECEF88318F00492EF995D7191DB38ED458B6A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$__filbuf_memcpy_s
                                                                            • String ID:
                                                                            • API String ID: 2885843685-0
                                                                            • Opcode ID: 6d6925a77775332182466e43a48f3aa918a8684e8f45aebb4570ceddabfd8d45
                                                                            • Instruction ID: 8d222a48d55b4acc09949d8f2fd565fbcdcb2311850145653533022fb81319fc
                                                                            • Opcode Fuzzy Hash: 6d6925a77775332182466e43a48f3aa918a8684e8f45aebb4570ceddabfd8d45
                                                                            • Instruction Fuzzy Hash: 32513B35900605EBCB208F698E4499F77B4FF42322F14825BFC25922D3D7B89E49CB59
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: __close__flush__freebuf
                                                                            • String ID:
                                                                            • API String ID: 3722736141-0
                                                                            • Opcode ID: 67a782b1f4283915900da6078be2fd31c3b5e47ca8a9d68ce3e979e1bd770940
                                                                            • Instruction ID: 9d03d284387e27f83df6200fdd7217aede530b946880ce88e7cf6cdacfabfba9
                                                                            • Opcode Fuzzy Hash: 67a782b1f4283915900da6078be2fd31c3b5e47ca8a9d68ce3e979e1bd770940
                                                                            • Instruction Fuzzy Hash: B0F0C862901B005E86307A7B4D4185BB3DC5E8773AB144B1FFE65D21D3E6AC980E866A
                                                                            APIs
                                                                              • Part of subcall function 00405AA7: MessageBoxA.USER32(00000000,AVector: []: Out of bounds.,Fatal Error,00000010), ref: 00405ABA
                                                                              • Part of subcall function 0040C4DB: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Windows\regsvr.exe,00000104,0048D8B0,C:\Windows\regsvr.exe,?,?,00406C7E,C:\Windows\regsvr.exe,00000104), ref: 0040C4F9
                                                                            • GetPrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?,0000FFFF,?), ref: 0041A36F
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.4593984874.0000000000401000.00000004.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000009.00000002.4593911440.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.0000000000476000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.000000000048F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4593984874.00000000004A2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                            • Associated: 00000009.00000002.4594417156.00000000004A5000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_400000_regsvr.jbxd
                                                                            Similarity
                                                                            • API ID: FullMessageNamePathPrivateProfileString
                                                                            • String ID:
                                                                            • API String ID: 2293904819-0
                                                                            • Opcode ID: 7ac7ce0f5b8ca6039468c3ba847e0187ea7638d5644e6a267e4d956b3743f0b8
                                                                            • Instruction ID: afdfd4a222a38ee004319feb394522888084550f90ab02918900143d29eaee06
                                                                            • Opcode Fuzzy Hash: 7ac7ce0f5b8ca6039468c3ba847e0187ea7638d5644e6a267e4d956b3743f0b8
                                                                            • Instruction Fuzzy Hash: 4D01B1B26002186ADB21B7754C8A9AF239EDB84329B14457BF805F7582DA3CED498A54