Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
W3XqCWvDWC

Overview

General Information

Sample Name:W3XqCWvDWC (renamed file extension from none to dll)
Analysis ID:631906
MD5:661a35a77c56679722f7180fc4add7ba
SHA1:81041189ebf61ed4220f4cea933465cc28d48f57
SHA256:1abc2d91d10d8a44bcc6ce69334f992e5304f3dcb48fe8328d888a25f3228c8d
Tags:exetrojan
Infos:

Detection

Emotet
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Machine Learning detection for sample
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7136 cmdline: loaddll64.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7152 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5116 cmdline: rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 6520 cmdline: C:\Windows\system32\WerFault.exe -u -p 5116 -s 336 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 7164 cmdline: regsvr32.exe /s C:\Users\user\Desktop\W3XqCWvDWC.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6176 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KYnbMwv\FkmMqbieZ.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 3628 cmdline: rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_FileTime MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 6360 cmdline: C:\Windows\system32\WerFault.exe -u -p 3628 -s 328 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 5852 cmdline: rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_SystemTime MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6532 cmdline: rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 4744 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 6440 cmdline: C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • WerFault.exe (PID: 6468 cmdline: C:\Windows\system32\WerFault.exe -pss -s 492 -p 3628 -ip 3628 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
  • svchost.exe (PID: 1388 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5268 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4028 cmdline: c:\windows\system32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5832 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3264 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5528 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000000.385599828.0000021F07620000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000004.00000002.423121816.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000004.00000002.422408365.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000000.385750200.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000007.00000002.884802021.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 11 entries
            SourceRuleDescriptionAuthorStrings
            3.2.rundll32.exe.21f07620000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.0.rundll32.exe.29d0dc80000.2.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.0.rundll32.exe.21f07620000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.0.rundll32.exe.21f07620000.2.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    2.2.regsvr32.exe.cf0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 11 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: W3XqCWvDWC.dllReversingLabs: Detection: 58%
                      Source: W3XqCWvDWC.dllJoe Sandbox ML: detected
                      Source: W3XqCWvDWC.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BEF0 FindFirstFileW,FindNextFileW,FindClose,7_2_000000018000BEF0

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 165.22.73.229 8080Jump to behavior
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 165.22.73.229 165.22.73.229
                      Source: global trafficTCP traffic: 192.168.2.7:49757 -> 165.22.73.229:8080
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: regsvr32.exe, 00000007.00000003.680911546.000000000068C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884396963.000000000068C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.885256549.00000194FAC60000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.726705919.000001F138F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000019.00000002.885098836.00000194FAC00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.726705919.000001F138F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 00000007.00000003.680911546.000000000068C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681248144.00000000006BB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681118030.00000000006B7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884396963.000000000068C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884440208.00000000006BC000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000019.00000002.884582548.00000194F54AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressin
                      Source: regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229/
                      Source: regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681285538.0000000000642000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884301913.000000000062B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884330143.0000000000643000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681151375.0000000000633000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/
                      Source: regsvr32.exe, 00000007.00000003.681285538.0000000000642000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884330143.0000000000643000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681151375.0000000000633000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/temD
                      Source: svchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000001D.00000003.695210547.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695235903.000001F138FA7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695226327.000001F138F96000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695254149.000001F139402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000001D.00000003.695210547.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695235903.000001F138FA7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695226327.000001F138F96000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695254149.000001F139402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 0000001D.00000003.695210547.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695235903.000001F138FA7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695226327.000001F138F96000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695254149.000001F139402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 0000001D.00000003.704245305.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.704223588.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017C8C InternetReadFile,7_2_0000000180017C8C

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 3.2.rundll32.exe.21f07620000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.cf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.cf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.29d0dc80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.29d0dc80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.21f07620000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000000.385599828.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.423121816.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.422408365.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.385750200.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.884802021.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.420849209.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.385379226.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.884543740.0000000001F20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.383190699.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.384165191.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.383957079.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.385421793.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.420695494.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.384837851.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.383431733.0000000000CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\KYnbMwv\FkmMqbieZ.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\KYnbMwv\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE5812B02_2_00007FF8BE5812B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE58443C2_2_00007FF8BE58443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE5868502_2_00007FF8BE586850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE5853FB2_2_00007FF8BE5853FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE585CAD2_2_00007FF8BE585CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE584A702_2_00007FF8BE584A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE585E012_2_00007FF8BE585E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00CE00002_2_00CE0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800264102_2_0000000180026410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025C302_2_0000000180025C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011CCC2_2_0000000180011CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D5102_2_000000018001D510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D582_2_0000000180001D58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011E5C2_2_0000000180011E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C6C82_2_000000018002C6C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C2C82_2_000000018002C2C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026F142_2_0000000180026F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800163202_2_0000000180016320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013782_2_0000000180001378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018FE82_2_0000000180018FE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ABE82_2_000000018001ABE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800243F42_2_00000001800243F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800083F82_2_00000001800083F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800247FC2_2_00000001800247FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DBFC2_2_000000018001DBFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001100C2_2_000000018001100C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027C282_2_0000000180027C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002143C2_2_000000018002143C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001303C2_2_000000018001303C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A8402_2_000000018002A840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800038402_2_0000000180003840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B4442_2_000000018000B444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F0482_2_000000018000F048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002AC4C2_2_000000018002AC4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800100502_2_0000000180010050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800030502_2_0000000180003050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000445C2_2_000000018000445C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C85C2_2_000000018000C85C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800034602_2_0000000180003460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029C6C2_2_0000000180029C6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001586C2_2_000000018001586C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000406C2_2_000000018000406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E06C2_2_000000018000E06C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BC702_2_000000018000BC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001447C2_2_000000018001447C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026C802_2_0000000180026C80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010C842_2_0000000180010C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800160882_2_0000000180016088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800028882_2_0000000180002888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017C8C2_2_0000000180017C8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FC8C2_2_000000018000FC8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D0982_2_000000018002D098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800154B82_2_00000001800154B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800064D02_2_00000001800064D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800180D42_2_00000001800180D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800054D82_2_00000001800054D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002CCE02_2_000000018002CCE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800254E42_2_00000001800254E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800184E82_2_00000001800184E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800010E82_2_00000001800010E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E8F02_2_000000018000E8F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A0F82_2_000000018002A0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800199002_2_0000000180019900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800119042_2_0000000180011904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F9082_2_000000018001F908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002490C2_2_000000018002490C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001890C2_2_000000018001890C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003D182_2_0000000180003D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002191C2_2_000000018002191C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D1282_2_000000018001D128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D12C2_2_000000018000D12C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800149302_2_0000000180014930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800085342_2_0000000180008534
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD442_2_000000018001CD44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B9482_2_000000018000B948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000796C2_2_000000018000796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800105902_2_0000000180010590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028D942_2_0000000180028D94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800091A82_2_00000001800091A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800171B82_2_00000001800171B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018DBC2_2_0000000180018DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800141C82_2_00000001800141C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B1D42_2_000000018002B1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023DDC2_2_0000000180023DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800165E42_2_00000001800165E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029DF02_2_0000000180029DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015DF42_2_0000000180015DF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800011F42_2_00000001800011F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FE082_2_000000018000FE08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027E142_2_0000000180027E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B6182_2_000000018000B618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800232202_2_0000000180023220
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020A342_2_0000000180020A34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800076342_2_0000000180007634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022E382_2_0000000180022E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E6382_2_000000018000E638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800102502_2_0000000180010250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026A642_2_0000000180026A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800042642_2_0000000180004264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800136742_2_0000000180013674
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F6782_2_000000018000F678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E2782_2_000000018000E278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005E7C2_2_0000000180005E7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025E882_2_0000000180025E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002868C2_2_000000018002868C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014E982_2_0000000180014E98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014AA42_2_0000000180014AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800126A82_2_00000001800126A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800036A82_2_00000001800036A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A6BC2_2_000000018002A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CABC2_2_000000018001CABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EAC02_2_000000018000EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B6D42_2_000000018001B6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F2DC2_2_000000018000F2DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800202E02_2_00000001800202E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800226E02_2_00000001800226E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019AF02_2_0000000180019AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BEF02_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012EF82_2_0000000180012EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800297102_2_0000000180029710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800177102_2_0000000180017710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C7402_2_000000018000C740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020F442_2_0000000180020F44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023B482_2_0000000180023B48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800237482_2_0000000180023748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800217542_2_0000000180021754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800223582_2_0000000180022358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029F5C2_2_0000000180029F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B3682_2_000000018002B368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BF702_2_000000018001BF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800253742_2_0000000180025374
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007F742_2_0000000180007F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021F7C2_2_0000000180021F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197882_2_0000000180019788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001B8C2_2_0000000180001B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800283942_2_0000000180028394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013B942_2_0000000180013B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001479C2_2_000000018001479C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E7A02_2_000000018000E7A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800087A42_2_00000001800087A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017BA82_2_0000000180017BA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EBAC2_2_000000018000EBAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B3B82_2_000000018001B3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012BB82_2_0000000180012BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800257C02_2_00000001800257C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008BC02_2_0000000180008BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800117C42_2_00000001800117C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800227E02_2_00000001800227E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE5812B03_2_00007FF8BE5812B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE58443C3_2_00007FF8BE58443C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE5868503_2_00007FF8BE586850
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE5853FB3_2_00007FF8BE5853FB
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE585CAD3_2_00007FF8BE585CAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE584A703_2_00007FF8BE584A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE585E013_2_00007FF8BE585E01
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021F076100003_2_0000021F07610000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000029D0C3900004_2_0000029D0C390000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007300007_2_00730000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800264107_2_0000000180026410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000680F7_2_000000018000680F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025C307_2_0000000180025C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800136747_2_0000000180013674
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017C8C7_2_0000000180017C8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A48C7_2_000000018000A48C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BEF07_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800297107_2_0000000180029710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001D5107_2_000000018001D510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026F147_2_0000000180026F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001D587_2_0000000180001D58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002B3687_2_000000018002B368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800013787_2_0000000180001378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800105907_2_0000000180010590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800091A87_2_00000001800091A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018DBC7_2_0000000180018DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800165E47_2_00000001800165E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018FE87_2_0000000180018FE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001ABE87_2_000000018001ABE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029DF07_2_0000000180029DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800243F47_2_00000001800243F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015DF47_2_0000000180015DF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800011F47_2_00000001800011F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800083F87_2_00000001800083F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800247FC7_2_00000001800247FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001DBFC7_2_000000018001DBFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000FE087_2_000000018000FE08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001100C7_2_000000018001100C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180027E147_2_0000000180027E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B6187_2_000000018000B618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800232207_2_0000000180023220
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180027C287_2_0000000180027C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020A347_2_0000000180020A34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800076347_2_0000000180007634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022E387_2_0000000180022E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E6387_2_000000018000E638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002143C7_2_000000018002143C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001303C7_2_000000018001303C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002A8407_2_000000018002A840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800038407_2_0000000180003840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B4447_2_000000018000B444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F0487_2_000000018000F048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002AC4C7_2_000000018002AC4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800100507_2_0000000180010050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800102507_2_0000000180010250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800030507_2_0000000180003050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180011E5C7_2_0000000180011E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000445C7_2_000000018000445C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C85C7_2_000000018000C85C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800034607_2_0000000180003460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026A647_2_0000000180026A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800042647_2_0000000180004264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029C6C7_2_0000000180029C6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001586C7_2_000000018001586C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000406C7_2_000000018000406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E06C7_2_000000018000E06C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BC707_2_000000018000BC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F6787_2_000000018000F678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E2787_2_000000018000E278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001447C7_2_000000018001447C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180005E7C7_2_0000000180005E7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026C807_2_0000000180026C80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010C847_2_0000000180010C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025E887_2_0000000180025E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800160887_2_0000000180016088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800028887_2_0000000180002888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002868C7_2_000000018002868C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000FC8C7_2_000000018000FC8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002D0987_2_000000018002D098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180014E987_2_0000000180014E98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180014AA47_2_0000000180014AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800126A87_2_00000001800126A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800036A87_2_00000001800036A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800154B87_2_00000001800154B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002A6BC7_2_000000018002A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001CABC7_2_000000018001CABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000EAC07_2_000000018000EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002C6C87_2_000000018002C6C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002C2C87_2_000000018002C2C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180011CCC7_2_0000000180011CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800064D07_2_00000001800064D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001B6D47_2_000000018001B6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800180D47_2_00000001800180D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800054D87_2_00000001800054D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F2DC7_2_000000018000F2DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800202E07_2_00000001800202E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002CCE07_2_000000018002CCE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800226E07_2_00000001800226E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800254E47_2_00000001800254E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800184E87_2_00000001800184E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800010E87_2_00000001800010E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019AF07_2_0000000180019AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E8F07_2_000000018000E8F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002A0F87_2_000000018002A0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012EF87_2_0000000180012EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800199007_2_0000000180019900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800119047_2_0000000180011904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F9087_2_000000018001F908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002490C7_2_000000018002490C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001890C7_2_000000018001890C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800177107_2_0000000180017710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180003D187_2_0000000180003D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002191C7_2_000000018002191C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800163207_2_0000000180016320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001D1287_2_000000018001D128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000D12C7_2_000000018000D12C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800149307_2_0000000180014930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800085347_2_0000000180008534
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C7407_2_000000018000C740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020F447_2_0000000180020F44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001CD447_2_000000018001CD44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180023B487_2_0000000180023B48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800237487_2_0000000180023748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B9487_2_000000018000B948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800217547_2_0000000180021754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800223587_2_0000000180022358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029F5C7_2_0000000180029F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000796C7_2_000000018000796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001BF707_2_000000018001BF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800253747_2_0000000180025374
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007F747_2_0000000180007F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021F7C7_2_0000000180021F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800197887_2_0000000180019788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001B8C7_2_0000000180001B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180028D947_2_0000000180028D94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800283947_2_0000000180028394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013B947_2_0000000180013B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001479C7_2_000000018001479C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E7A07_2_000000018000E7A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800087A47_2_00000001800087A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017BA87_2_0000000180017BA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000EBAC7_2_000000018000EBAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012BB87_2_0000000180012BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001B3B87_2_000000018001B3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800171B87_2_00000001800171B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800257C07_2_00000001800257C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008BC07_2_0000000180008BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800117C47_2_00000001800117C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800141C87_2_00000001800141C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002B1D47_2_000000018002B1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180023DDC7_2_0000000180023DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800227E07_2_00000001800227E0
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8BE587FF0 appears 31 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8BE58B3B0 appears 148 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8BE58BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8BE587FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8BE58B3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8BE58BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: W3XqCWvDWC.dllReversingLabs: Detection: 58%
                      Source: W3XqCWvDWC.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\W3XqCWvDWC.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_FileTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_SystemTime
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KYnbMwv\FkmMqbieZ.dll"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 492 -p 3628 -ip 3628
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,DllRegisterServer
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5116 -s 336
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3628 -s 328
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\W3XqCWvDWC.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_FileTimeJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_SystemTimeJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KYnbMwv\FkmMqbieZ.dll"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 492 -p 3628 -ip 3628Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5116 -s 336Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3628 -s 328Jump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERD544.tmpJump to behavior
                      Source: classification engineClassification label: mal72.troj.evad.winDLL@32/16@0/3
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029710 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,7_2_0000000180029710
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:6468:120:WilError_01
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3628
                      Source: C:\Windows\System32\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:6440:120:WilError_01
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5116
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: W3XqCWvDWC.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: W3XqCWvDWC.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006951 pushad ; retf 2_2_0000000180006953
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE590CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_00007FF8BE590CC0
                      Source: W3XqCWvDWC.dllStatic PE information: real checksum: 0x61dc7 should be: 0x5eec3
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\W3XqCWvDWC.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\KYnbMwv\FkmMqbieZ.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\KYnbMwv\FkmMqbieZ.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2240Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 5408Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-12629
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-16438
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.9 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 9.5 %
                      Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BEF0 FindFirstFileW,FindNextFileW,FindClose,7_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-16439
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-16271
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-12468
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-12630
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: svchost.exe, 00000019.00000002.884401657.00000194F5429000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@`
                      Source: svchost.exe, 0000001D.00000002.726404893.000001F13848B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                      Source: regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681285538.0000000000642000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884330143.0000000000643000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681151375.0000000000633000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.885256549.00000194FAC60000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.885239072.00000194FAC4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.726480754.000001F1384ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000010.00000002.884288009.0000016CA9802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@,.
                      Source: svchost.exe, 00000010.00000002.884331383.0000016CA9828000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE58BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8BE58BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE590215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,2_2_00007FF8BE590215
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE590CC0 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_00007FF8BE590CC0
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE58BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8BE58BE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE583280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FF8BE583280
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE58BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF8BE58BE50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FF8BE583280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF8BE583280

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 165.22.73.229 8080Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -pss -s 492 -p 3628 -ip 3628Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5116 -s 336Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3628 -s 328Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE588900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,2_2_00007FF8BE588900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FF8BE588860 HeapCreate,GetVersion,HeapSetInformation,2_2_00007FF8BE588860

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.rundll32.exe.21f07620000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.cf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.cf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.29d0dc80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.29d0dc80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.21f07620000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.29d0dc80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.1f20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.21f07620000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000000.385599828.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.423121816.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.422408365.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.385750200.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.884802021.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.420849209.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.385379226.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.884543740.0000000001F20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.383190699.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.384165191.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.383957079.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.385421793.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.420695494.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.384837851.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.383431733.0000000000CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Native API
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      3
                      Virtualization/Sandbox Evasion
                      LSASS Memory1
                      Query Registry
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager41
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Ingress Tool Transfer
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS3
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem25
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 631906 Sample: W3XqCWvDWC Startdate: 22/05/2022 Architecture: WINDOWS Score: 72 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected Emotet 2->50 52 Machine Learning detection for sample 2->52 8 loaddll64.exe 1 2->8         started        10 svchost.exe 8 2->10         started        12 svchost.exe 9 1 2->12         started        15 5 other processes 2->15 process3 dnsIp4 17 regsvr32.exe 5 8->17         started        20 cmd.exe 1 8->20         started        22 rundll32.exe 8->22         started        28 2 other processes 8->28 24 WerFault.exe 10->24         started        26 WerFault.exe 10->26         started        40 127.0.0.1 unknown unknown 12->40 42 192.168.2.1 unknown unknown 15->42 process5 signatures6 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->46 30 regsvr32.exe 17->30         started        34 rundll32.exe 20->34         started        36 WerFault.exe 9 22->36         started        process7 dnsIp8 44 165.22.73.229, 49757, 8080 DIGITALOCEAN-ASNUS United States 30->44 54 System process connects to network (likely due to code injection or exploit) 30->54 38 WerFault.exe 20 9 34->38         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      W3XqCWvDWC.dll59%ReversingLabsWin64.Trojan.Emotet
                      W3XqCWvDWC.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      7.2.regsvr32.exe.1f20000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.29d0dc80000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.0.rundll32.exe.21f07620000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      2.2.regsvr32.exe.cf0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.29d0dc80000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.29d0dc80000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.0.rundll32.exe.21f07620000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.21f07620000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://165.22.73.229:8080/0%Avira URL Cloudsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      https://165.22.73.229/0%Avira URL Cloudsafe
                      https://165.22.73.229:8080/temD0%Avira URL Cloudsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://165.22.73.229:8080/regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681285538.0000000000642000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884301913.000000000062B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884330143.0000000000643000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681151375.0000000000633000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.hotspotshield.com/terms/svchost.exe, 0000001D.00000003.695210547.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695235903.000001F138FA7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695226327.000001F138F96000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695254149.000001F139402000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.pango.co/privacysvchost.exe, 0000001D.00000003.695210547.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695235903.000001F138FA7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695226327.000001F138F96000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695254149.000001F139402000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://disneyplus.com/legal.svchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://165.22.73.229/regsvr32.exe, 00000007.00000003.681201624.000000000065B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884354736.000000000065C000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://165.22.73.229:8080/temDregsvr32.exe, 00000007.00000003.681285538.0000000000642000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.884330143.0000000000643000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.681151375.0000000000633000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.ver)svchost.exe, 00000019.00000002.885098836.00000194FAC00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.726705919.000001F138F00000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 0000001D.00000003.704245305.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.704223588.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 0000001D.00000003.699848849.000001F138F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressinsvchost.exe, 00000019.00000002.884582548.00000194F54AF000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://support.hotspotshield.com/svchost.exe, 0000001D.00000003.695210547.000001F139402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695235903.000001F138FA7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695226327.000001F138F96000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001D.00000003.695254149.000001F139402000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            165.22.73.229
                            unknownUnited States
                            14061DIGITALOCEAN-ASNUStrue
                            IP
                            192.168.2.1
                            127.0.0.1
                            Joe Sandbox Version:34.0.0 Boulder Opal
                            Analysis ID:631906
                            Start date and time: 22/05/202222:28:122022-05-22 22:28:12 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 11m 17s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Sample file name:W3XqCWvDWC (renamed file extension from none to dll)
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:31
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal72.troj.evad.winDLL@32/16@0/3
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 73% (good quality ratio 38.9%)
                            • Quality average: 32.7%
                            • Quality standard deviation: 37.6%
                            HCA Information:
                            • Successful, ratio: 93%
                            • Number of executed functions: 41
                            • Number of non-executed functions: 247
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Override analysis time to 240s for rundll32
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 13.89.179.12, 20.189.173.22, 173.222.108.210, 173.222.108.226, 93.184.221.240, 69.192.160.56, 20.223.24.244
                            • Excluded domains from analysis (whitelisted): onedsblobprdwus17.westus.cloudapp.azure.com, onedsblobprdcus17.centralus.cloudapp.azure.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu.azureedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu.ec.azureedge.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.even
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: W3XqCWvDWC.dll
                            TimeTypeDescription
                            22:29:56API Interceptor2x Sleep call for process: WerFault.exe modified
                            22:31:07API Interceptor10x Sleep call for process: svchost.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            165.22.73.229VUzZGNPCim.dllGet hashmaliciousBrowse
                              ZWc3yi399O.dllGet hashmaliciousBrowse
                                QK2fMdqsA1.dllGet hashmaliciousBrowse
                                  CVVgbFa04U.dllGet hashmaliciousBrowse
                                    HN8n4TeTGO.dllGet hashmaliciousBrowse
                                      VUzZGNPCim.dllGet hashmaliciousBrowse
                                        ZWc3yi399O.dllGet hashmaliciousBrowse
                                          QK2fMdqsA1.dllGet hashmaliciousBrowse
                                            HN8n4TeTGO.dllGet hashmaliciousBrowse
                                              CVVgbFa04U.dllGet hashmaliciousBrowse
                                                hx0cxL0x56.dllGet hashmaliciousBrowse
                                                  ckjV3enNDr.dllGet hashmaliciousBrowse
                                                    RyxCHM5yNz.dllGet hashmaliciousBrowse
                                                      eoNBU1NB8n.dllGet hashmaliciousBrowse
                                                        dmnhAOheZm.dllGet hashmaliciousBrowse
                                                          hx0cxL0x56.dllGet hashmaliciousBrowse
                                                            ckjV3enNDr.dllGet hashmaliciousBrowse
                                                              RyxCHM5yNz.dllGet hashmaliciousBrowse
                                                                eoNBU1NB8n.dllGet hashmaliciousBrowse
                                                                  dmnhAOheZm.dllGet hashmaliciousBrowse
                                                                    No context
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    DIGITALOCEAN-ASNUSVUzZGNPCim.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    ZWc3yi399O.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    QK2fMdqsA1.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    CVVgbFa04U.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    HN8n4TeTGO.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    VUzZGNPCim.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    ZWc3yi399O.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    QK2fMdqsA1.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    HN8n4TeTGO.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    CVVgbFa04U.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    FC6cLk6kKz.dllGet hashmaliciousBrowse
                                                                    • 159.65.88.10
                                                                    ViiTOVGM74.dllGet hashmaliciousBrowse
                                                                    • 159.65.88.10
                                                                    69hw6kwGu3.dllGet hashmaliciousBrowse
                                                                    • 104.248.225.227
                                                                    0xnQJ1y1YE.dllGet hashmaliciousBrowse
                                                                    • 134.122.66.193
                                                                    hx0cxL0x56.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    ckjV3enNDr.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    RyxCHM5yNz.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    nnQLG95Iw5.dllGet hashmaliciousBrowse
                                                                    • 68.183.93.250
                                                                    eoNBU1NB8n.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    dmnhAOheZm.dllGet hashmaliciousBrowse
                                                                    • 165.22.73.229
                                                                    No context
                                                                    No context
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xd1c7ce56, page size 16384, DirtyShutdown, Windows version 10.0
                                                                    Category:dropped
                                                                    Size (bytes):786432
                                                                    Entropy (8bit):0.25074921083906204
                                                                    Encrypted:false
                                                                    SSDEEP:384:U+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:rSB2nSB2RSjlK/+mLesOj1J2
                                                                    MD5:655EF77631B804E811F945211D0860EC
                                                                    SHA1:15878DB9A86EDB93C7FC9D382E3298F69A914105
                                                                    SHA-256:406019DA88D19D1184B21C19CB8E0B0B928BB9E9092DD2557368BD08A48ACADB
                                                                    SHA-512:D8302FE347B93AC0E11397930015B9D6BA09EF8EAD51FD5FE5D64ED6548A820FD2DAA13CA9E3F8B8A7B2A7EAB5925AF97060F4927D043078DC3E5B5D071F44D0
                                                                    Malicious:false
                                                                    Preview:...V... ................e.f.3...w........................&..........w.......z..h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w......................................................................................................................................................................................................................................V........z...................?.......z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):0.7861290894240726
                                                                    Encrypted:false
                                                                    SSDEEP:96:qDF9UivJPnySjv55od7Rt6tpXIQcQac6FcEocw3ZXaXz+HbHgSQgJPbwqIDV9w8j:MMivJKgHkBy9jJ9/u7sYS274lt+l
                                                                    MD5:93245C6EC22D32CE8F51441732DEF5C0
                                                                    SHA1:754BD6C0F4767B3DE819B860F0938DAAF865FB81
                                                                    SHA-256:04F12EC43F8F211B0CC6E02860BFD7ED7C3414860EA480A3A0A43F7A47EF5D72
                                                                    SHA-512:F6C7FCC1997E5179AED4FE4763CFDF5496CB19CEF90281F33CCB1C10757718BDAD42D3FAACEF64D77E2986EBF883B3568DCDA64DAD5964956D8054FC8C4E2B81
                                                                    Malicious:false
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.5.7.3.8.9.1.8.3.6.4.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.5.7.3.9.5.0.8.9.8.5.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.a.5.4.8.0.8.3.-.4.b.3.e.-.4.5.0.e.-.9.2.1.2.-.7.2.9.1.0.a.9.e.f.8.8.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.f.d.2.2.1.7.b.-.1.0.3.3.-.4.b.5.d.-.8.3.3.6.-.9.3.c.5.6.d.c.4.8.b.f.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.W.3.X.q.C.W.v.D.W.C...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.2.c.-.0.0.0.1.-.0.0.1.8.-.b.e.2.b.-.1.9.1.4.6.6.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):0.785280213024148
                                                                    Encrypted:false
                                                                    SSDEEP:96:18F6YcFUiD2JPnyLjv55od7Rt6tpXIQcQac6FcEocw3ZXaXz+HbHgSQgJPbwqIDP:i//iD2JKhHkBy9jJ9/u7sYS274lt+l
                                                                    MD5:80B2294DA5AA05766AB50AA915D7891E
                                                                    SHA1:F6E866D499EF299403F071710D3AC41DC9251588
                                                                    SHA-256:FC36EA83A7AF34E6CA9FE238A523AE2060AF9D16200F8FE87F291A0159E877BC
                                                                    SHA-512:2636F604D6C4B1F908C93F6378C17332A8C389DF85EC7FAB1CF55F2C9017636C64865FC40B913AA3FBFAA8B55D9858D56FF28EDE54094FB2042FD3B93291E9DA
                                                                    Malicious:false
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.5.7.3.8.8.0.3.8.5.1.3.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.5.7.3.9.4.4.9.1.5.9.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.4.6.6.5.7.9.3.-.d.0.c.9.-.4.9.b.0.-.a.2.a.f.-.7.e.9.0.c.c.3.c.e.7.c.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.f.b.c.b.1.6.b.-.6.8.4.9.-.4.7.7.b.-.b.f.c.4.-.2.b.9.9.2.2.1.5.d.d.1.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.W.3.X.q.C.W.v.D.W.C...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.f.c.-.0.0.0.1.-.0.0.1.8.-.a.3.b.f.-.9.a.1.3.6.6.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 15 streams, Mon May 23 05:29:49 2022, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):62524
                                                                    Entropy (8bit):2.368950805352583
                                                                    Encrypted:false
                                                                    SSDEEP:384:MA04cSe2YqH2jC2s4V3kMcldYncnfD5zJ+3y:pfMqH2jCj4xz+RfDrKy
                                                                    MD5:DA3AB356F2B46AAD9C8F0FDF9E53B268
                                                                    SHA1:2454B3D70D79519F53CCB060D13A111491AEF099
                                                                    SHA-256:B8A8C6BF0E4777E5DA3BC1291C38FAC4976EEFD888964C5E9F28D2C269D19946
                                                                    SHA-512:4595A8F4080186B5E243A5B1179C62A4DA64C1F6A6D0BE9625C96229B4F6F479C43761900667A6F926829C1D0DB7A7B1DC279A52561D94F68ECFA438D977FD54
                                                                    Malicious:false
                                                                    Preview:MDMP....... ..........b........................................8.......$...d;..........`.......8...........T............................"...........$...................................................................U...........B......P%......Lw..................Y...T..............b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 15 streams, Mon May 23 05:29:50 2022, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):2.27560589422894
                                                                    Encrypted:false
                                                                    SSDEEP:192:aV4ISFa04cqPyowuCSrMV/qkm+s494cuBOC5Ic6wHXdOYXqf1XItVSqv7awIl+mf:YL04cSe2YqH2pC2crcldYnYTlG
                                                                    MD5:40723BED99C639BDBCECCB9C93712EA7
                                                                    SHA1:04DDBEAFF0D58083313E19E289E7FEDEDBB8D551
                                                                    SHA-256:09DF41903027B5537B9E65985974A84C93B4C782A58393490F33D671EE61F353
                                                                    SHA-512:683FB76E4342B3DE71016F3644304C4A301568797A27335E4CEAAB539E0328634B372EEBCC33D1C5FF1605BEC9EA716C06EAB6CE74A39877293062A10FF19E14
                                                                    Malicious:false
                                                                    Preview:MDMP....... ..........b........................................8.......$...d;..........`.......8...........T...........X................"...........$...................................................................U...........B......P%......Lw......................T.......,......b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8654
                                                                    Entropy (8bit):3.6977082844769855
                                                                    Encrypted:false
                                                                    SSDEEP:192:Rrl7r3GLNimCRH+PzA6YqjCgmf8uSkCprf89b/xKfmZVm:RrlsNiTRH+bA6YuCgmf8uS8/8fN
                                                                    MD5:C5846E0BCC037A8A65264DCC3278F594
                                                                    SHA1:8DEF6CCCE22677DBBD4571919477854C8905F420
                                                                    SHA-256:31A25ECBB877C672C188FB63C59AEBB7CB5625C096DB9857AE1E6A546F49F3C5
                                                                    SHA-512:D20553FACFD18FBF1A20A408FBFCB15CFF8AA64D50BFFF19C2F9349235C4BA3E266B0E03109A1D36EAE0EA5FB718CF5F0C182268A5218B23BC68513B5999035D
                                                                    Malicious:false
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.1.1.6.<./.P.i.d.>.......
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4892
                                                                    Entropy (8bit):4.508316787911904
                                                                    Encrypted:false
                                                                    SSDEEP:48:cvIwSD8zsXJgtBI9fnWgc8sqYjmFa8fm8M4JCqC9fwnF4Fyq8vh9fwV0ZESC5SLd:uITf55WgrsqYCRJ2FWFVvLd
                                                                    MD5:AFBA7F16C9005E8C855248ABC1D2F8CD
                                                                    SHA1:CE060E98EE3A5807B6316DCC05210D78F33A59EF
                                                                    SHA-256:5ECE0E0F46041834E4A5F9184FF89B53D88161276839AB42C38FC5C8ACCCD403
                                                                    SHA-512:F59A3E961A3B405B3258C2F533F0C7E520845BABC23230FD484504C6951CB262F00AEB5DEBDEBC26620826F3435E7C4CC34DFB866FF39BB190B3A8347E4F9E9F
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1527280" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):6862
                                                                    Entropy (8bit):3.7235885574018686
                                                                    Encrypted:false
                                                                    SSDEEP:192:Rrl7r3GLNiiCQfc+xuY8uSkCpri89b2U+feSm:RrlsNiYfc+xuY8uSH2Nfy
                                                                    MD5:3599DA8B34D1693CE09BD96799977A41
                                                                    SHA1:9E9B79CCC5FFA070DFDEF7C8F82F7B67B64C2E05
                                                                    SHA-256:B6E677966A3FF82F0EF52B40578E7F18D872732AC1B82F2522267F151DC9641C
                                                                    SHA-512:0D50A17C725B44E5AAC5E57B871EF6DCD1C8BF6156719BA55498D4DBB39C80F6F092510F2BED680342C47CC428F333B82DCBAEF8BF011FF55EE74479238960EE
                                                                    Malicious:false
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.6.2.8.<./.P.i.d.>.......
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):54318
                                                                    Entropy (8bit):3.0561636569688413
                                                                    Encrypted:false
                                                                    SSDEEP:1536:9bHI2UZ/nfGgSu40/v9BiWf/0xk29kAuy6KyM:9bHI2UZ/nfGgSu4039BiWf/0xk29kAuk
                                                                    MD5:C16FA7D7DD76E81D9F75A377422A40E5
                                                                    SHA1:CC322D768197C5E65010DC6AB51C4675A3180879
                                                                    SHA-256:133C390D6338F019FA3DED9D1BED7601C0566569D371ADA0DBD6EEF262288BE1
                                                                    SHA-512:7308C35D649F0B2F3896338482B4DFCC21DB3B98698FB802663EC6E1D5AEEB9FCE0B26D02CB4307F34AF256399D5A2FFE09205B0AF757D73209FE5FE604086C4
                                                                    Malicious:false
                                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4892
                                                                    Entropy (8bit):4.508597638922555
                                                                    Encrypted:false
                                                                    SSDEEP:48:cvIwSD8zsXJgtBI9fnWgc8sqYjf8fm8M4JCqC9fwnFRIUyq8vh9fwW0ZESC5SAd:uITf55WgrsqYgJ3pW4VvAd
                                                                    MD5:D0FC83B05EB92CE4D87C84057BE2B115
                                                                    SHA1:D61BD274F91D89C5258086D8D0EEBDC1DEEE927F
                                                                    SHA-256:6E0D93A6FA8AF71EA7A89934F69C64FFDF63954F6E3A9835EEFC2A64B127A1D7
                                                                    SHA-512:6744B25A44AA3F4393ED56D5CB2919516467C588B41EF90D02BDE321A90B66F27B212104CDA5CDB70B2D961E94D6A5ADA8FF6906604AA3C6DE597F618DDBAE1A
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1527280" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):54334
                                                                    Entropy (8bit):3.056249879577972
                                                                    Encrypted:false
                                                                    SSDEEP:1536:2CHPIOQnfiTu40/vYoYWf/sxt8JqAuVH2yD:2CHPIOQnfiTu403YoYWf/sxt8JqAuVHf
                                                                    MD5:4ED04F837989BC6C4C2B298FAE9D6B8D
                                                                    SHA1:EE7BBDA8D2E7DC62055926CF23DC8BD1487C5BB7
                                                                    SHA-256:86527C3AB8041506EFB5934F542D4ED464CFBABABD67C23491D4EC535739DA15
                                                                    SHA-512:53CE10FDED9BE6FCCE86D5ED524EC0FE44F3578CCF58C58FDCCFA6C1F32B90EA0F9B162FBD87DC62BE3CC42954AA4182C81868E1E59B9BC698589C5221E02B1F
                                                                    Malicious:false
                                                                    Preview:I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):13340
                                                                    Entropy (8bit):2.697454980773062
                                                                    Encrypted:false
                                                                    SSDEEP:96:kiZYWXl+2ohmYQYUWoNHqYEZ4Mt8iKLOf8ywIkwa+EJ/SIIf23:hZDXl/H952Za+EJ/Svf23
                                                                    MD5:641B834246796078E459F1290191AF59
                                                                    SHA1:F326AD099635D3F0B95513EE82C4E7DB14B6A6EB
                                                                    SHA-256:A3A5222E604078C7CADA19AAFF53D4AF81354C7DB9FAC48149D0F7B883D4330D
                                                                    SHA-512:68A6F05D9B66A2659345CAAB9DD0805A72338B29280D76A577B615FE1ABDAB5A36D2E0BE9A160B288897DB4DD66F9BF3029AC026691BD22322D7184138B9C082
                                                                    Malicious:false
                                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):13340
                                                                    Entropy (8bit):2.697780492905745
                                                                    Encrypted:false
                                                                    SSDEEP:96:kiZYWGjZLRXYoYyWQHqYEZ8Nt8iKLOk8ywm1izLazEqGSIIB23:hZD2PhS4zLazEqGSvB23
                                                                    MD5:D63DD4C4EA9E1107F0D97535D2829F7F
                                                                    SHA1:7486551A9A93294C1B76A467C7DC46102792CD1F
                                                                    SHA-256:31AEE2D8CB178F469BDB1507972D8F4B3881DF1DB6EBB86B1ABA5CB6B6598174
                                                                    SHA-512:57CC8814B7DEB16EFED8440A7DF9FA888F21276E346FC207B9A46AB76844197895B42407DFD6E509F77C90FA9AF856A598241391DC5A95641200BC990A3AE18D
                                                                    Malicious:false
                                                                    Preview:B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.2.6.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                    Process:C:\Windows\System32\regsvr32.exe
                                                                    File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                    Category:dropped
                                                                    Size (bytes):61480
                                                                    Entropy (8bit):7.9951219482618905
                                                                    Encrypted:true
                                                                    SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                    MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                    SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                    SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                    SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                    Malicious:false
                                                                    Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                    Process:C:\Windows\System32\regsvr32.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):330
                                                                    Entropy (8bit):3.120848828934212
                                                                    Encrypted:false
                                                                    SSDEEP:6:kK5ooJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:BakPlE99SNxAhUesE1
                                                                    MD5:603C5F0CEFFCB07D2BC7E3B0921C6F69
                                                                    SHA1:FC148E38295C25F1BF82E1E17A6C6ECD40496293
                                                                    SHA-256:D8D2F8840CB2F29FCEFFF4A572756C4D212872DAA04332629187833D28CDAC1D
                                                                    SHA-512:29EFA296659770BDC21A4A3325E03345E75D59ED906730D5236853C3770896D9F9C67F54DC0922B14F29E90DD3FC29E7E016458B83461EA9BDE86DBC9D3D3E94
                                                                    Malicious:false
                                                                    Preview:p...... .........K+fn..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                                    Process:C:\Windows\System32\svchost.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):55
                                                                    Entropy (8bit):4.306461250274409
                                                                    Encrypted:false
                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                    Malicious:false
                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Entropy (8bit):7.152712651608759
                                                                    TrID:
                                                                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                    • Win64 Executable (generic) (12005/4) 10.17%
                                                                    • Generic Win/DOS Executable (2004/3) 1.70%
                                                                    • DOS Executable Generic (2002/1) 1.70%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                    File name:W3XqCWvDWC.dll
                                                                    File size:371200
                                                                    MD5:661a35a77c56679722f7180fc4add7ba
                                                                    SHA1:81041189ebf61ed4220f4cea933465cc28d48f57
                                                                    SHA256:1abc2d91d10d8a44bcc6ce69334f992e5304f3dcb48fe8328d888a25f3228c8d
                                                                    SHA512:94a66112e36647502419843e4f577b454c4f341616a580f029cb5c3e8decd9b07077ed16e158b0c029eaf04bb7fcbb7218120af76033749ba93203548235646f
                                                                    SSDEEP:6144:hlNuuXQASByX7/xoJcXy16qFHJ7wwD1w3pq6jTK/V9OT0u:hlNu9ASByX7Fy/BJ7rGTK/V3
                                                                    TLSH:C1848E46F7F551E5E8F7C13889A23267F9317C948B38A7CB8A44466A4F70BA0E93D701
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik...k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d....{.b.........."
                                                                    Icon Hash:74f0e4ecccdce0e4
                                                                    Entrypoint:0x180003580
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:false
                                                                    Imagebase:0x180000000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                    Time Stamp:0x62877BF5 [Fri May 20 11:31:01 2022 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:5
                                                                    OS Version Minor:2
                                                                    File Version Major:5
                                                                    File Version Minor:2
                                                                    Subsystem Version Major:5
                                                                    Subsystem Version Minor:2
                                                                    Import Hash:ad5c5b0f3e2e211c551f3b5059e614d7
                                                                    Instruction
                                                                    dec esp
                                                                    mov dword ptr [esp+18h], eax
                                                                    mov dword ptr [esp+10h], edx
                                                                    dec eax
                                                                    mov dword ptr [esp+08h], ecx
                                                                    dec eax
                                                                    sub esp, 28h
                                                                    cmp dword ptr [esp+38h], 01h
                                                                    jne 00007FB938BBE1C7h
                                                                    call 00007FB938BC3527h
                                                                    dec esp
                                                                    mov eax, dword ptr [esp+40h]
                                                                    mov edx, dword ptr [esp+38h]
                                                                    dec eax
                                                                    mov ecx, dword ptr [esp+30h]
                                                                    call 00007FB938BBE1D4h
                                                                    dec eax
                                                                    add esp, 28h
                                                                    ret
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    int3
                                                                    dec esp
                                                                    mov dword ptr [esp+18h], eax
                                                                    mov dword ptr [esp+10h], edx
                                                                    dec eax
                                                                    mov dword ptr [esp+08h], ecx
                                                                    dec eax
                                                                    sub esp, 48h
                                                                    mov dword ptr [esp+20h], 00000001h
                                                                    cmp dword ptr [esp+58h], 00000000h
                                                                    jne 00007FB938BBE1D2h
                                                                    cmp dword ptr [00028DE8h], 00000000h
                                                                    jne 00007FB938BBE1C9h
                                                                    xor eax, eax
                                                                    jmp 00007FB938BBE2E4h
                                                                    cmp dword ptr [esp+58h], 01h
                                                                    je 00007FB938BBE1C9h
                                                                    cmp dword ptr [esp+58h], 02h
                                                                    jne 00007FB938BBE210h
                                                                    dec eax
                                                                    cmp dword ptr [0001ED99h], 00000000h
                                                                    je 00007FB938BBE1DAh
                                                                    dec esp
                                                                    mov eax, dword ptr [esp+60h]
                                                                    mov edx, dword ptr [esp+58h]
                                                                    dec eax
                                                                    mov ecx, dword ptr [esp+50h]
                                                                    call dword ptr [0001ED83h]
                                                                    mov dword ptr [esp+20h], eax
                                                                    cmp dword ptr [esp+20h], 00000000h
                                                                    je 00007FB938BBE1D9h
                                                                    dec esp
                                                                    mov eax, dword ptr [esp+60h]
                                                                    mov edx, dword ptr [esp+58h]
                                                                    dec eax
                                                                    mov ecx, dword ptr [esp+50h]
                                                                    call 00007FB938BBDF2Ah
                                                                    mov dword ptr [esp+20h], eax
                                                                    cmp dword ptr [esp+20h], 00000000h
                                                                    jne 00007FB938BBE1C9h
                                                                    xor eax, eax
                                                                    Programming Language:
                                                                    • [LNK] VS2010 build 30319
                                                                    • [ASM] VS2010 build 30319
                                                                    • [ C ] VS2010 build 30319
                                                                    • [C++] VS2010 build 30319
                                                                    • [EXP] VS2010 build 30319
                                                                    • [RES] VS2010 build 30319
                                                                    • [IMP] VS2008 SP1 build 30729
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x2aab00x84.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2a1e40x50.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000x2e9fc.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2f0000xfcc.pdata
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000x294.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x220000x298.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x203fa0x20400False0.405439983043zlib compressed data5.75409030586IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x220000x8b340x8c00False0.275474330357data4.41581052225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0x2b0000x37980x1400False0.161328125data2.21550179132IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                    .pdata0x2f0000xfcc0x1000False0.5048828125data5.08183440168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x300000x2e9fc0x2ea00False0.887011980563data7.85049584102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .reloc0x5f0000x6fc0x800False0.21435546875data2.34217115221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountry
                                                                    RT_FONTDIR0x300a00x2e800dataEnglishUnited States
                                                                    RT_MANIFEST0x5e8a00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                    DLLImport
                                                                    KERNEL32.dllGetTimeFormatA, GetDateFormatA, GetThreadLocale, FileTimeToSystemTime, VirtualAlloc, ExitProcess, CloseHandle, CreateFileW, SetStdHandle, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlUnwindEx, EncodePointer, FlsGetValue, FlsAlloc, FlsFree, SetLastError, GetLastError, HeapSize, HeapValidate, IsBadReadPtr, DecodePointer, GetProcAddress, GetModuleHandleW, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, GetVersion, HeapCreate, HeapDestroy, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, HeapAlloc, GetModuleFileNameW, HeapReAlloc, HeapQueryInformation, HeapFree, WriteFile, LoadLibraryW, LCMapStringW, MultiByteToWideChar, GetStringTypeW, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, RaiseException, RtlPcToFileHeader, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers
                                                                    USER32.dllMessageBoxA
                                                                    ole32.dllCoTaskMemFree, CoTaskMemAlloc, CoLoadLibrary
                                                                    NameOrdinalAddress
                                                                    AddIn_FileTime10x180001140
                                                                    AddIn_SystemTime20x1800010b0
                                                                    DllRegisterServer30x180003110
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    May 22, 2022 22:30:09.205770016 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:09.248379946 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:09.248512030 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:09.315850973 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:09.358282089 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:09.368135929 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:09.368191957 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:09.368587017 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:12.461575031 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:12.505445957 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:12.505577087 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:12.512813091 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:12.596580982 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:12.764410019 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:12.764496088 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:30:15.768646002 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:15.768675089 CEST808049757165.22.73.229192.168.2.7
                                                                    May 22, 2022 22:30:15.768793106 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:31:59.324021101 CEST497578080192.168.2.7165.22.73.229
                                                                    May 22, 2022 22:31:59.324043989 CEST497578080192.168.2.7165.22.73.229

                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:22:29:28
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\loaddll64.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:loaddll64.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll"
                                                                    Imagebase:0x7ff77d910000
                                                                    File size:140288 bytes
                                                                    MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:1
                                                                    Start time:22:29:29
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
                                                                    Imagebase:0x7ff6a6590000
                                                                    File size:273920 bytes
                                                                    MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:2
                                                                    Start time:22:29:30
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\regsvr32.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:regsvr32.exe /s C:\Users\user\Desktop\W3XqCWvDWC.dll
                                                                    Imagebase:0x7ff799140000
                                                                    File size:24064 bytes
                                                                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.383431733.0000000000CF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high

                                                                    Target ID:3
                                                                    Start time:22:29:30
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\rundll32.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:rundll32.exe "C:\Users\user\Desktop\W3XqCWvDWC.dll",#1
                                                                    Imagebase:0x7ff728e80000
                                                                    File size:69632 bytes
                                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.385599828.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.420849209.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.385379226.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.383190699.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.383957079.0000021F07620000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.420695494.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high

                                                                    Target ID:4
                                                                    Start time:22:29:31
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\rundll32.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_FileTime
                                                                    Imagebase:0x7ff728e80000
                                                                    File size:69632 bytes
                                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.423121816.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.422408365.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.385750200.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.384165191.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.385421793.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.384837851.0000029D0DC80000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high

                                                                    Target ID:5
                                                                    Start time:22:29:37
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\rundll32.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,AddIn_SystemTime
                                                                    Imagebase:0x7ff728e80000
                                                                    File size:69632 bytes
                                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:6
                                                                    Start time:22:29:37
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:7
                                                                    Start time:22:29:38
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\regsvr32.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\KYnbMwv\FkmMqbieZ.dll"
                                                                    Imagebase:0x7ff799140000
                                                                    File size:24064 bytes
                                                                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.884802021.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.884543740.0000000001F20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high

                                                                    Target ID:8
                                                                    Start time:22:29:38
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 428 -p 5116 -ip 5116
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:494488 bytes
                                                                    MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:9
                                                                    Start time:22:29:38
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\WerFault.exe -pss -s 492 -p 3628 -ip 3628
                                                                    Imagebase:0x7ff684030000
                                                                    File size:494488 bytes
                                                                    MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:10
                                                                    Start time:22:29:40
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\rundll32.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:rundll32.exe C:\Users\user\Desktop\W3XqCWvDWC.dll,DllRegisterServer
                                                                    Imagebase:0x7ff728e80000
                                                                    File size:69632 bytes
                                                                    MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:11
                                                                    Start time:22:29:42
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 5116 -s 336
                                                                    Imagebase:0x7ff684030000
                                                                    File size:494488 bytes
                                                                    MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:12
                                                                    Start time:22:29:42
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\WerFault.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\WerFault.exe -u -p 3628 -s 328
                                                                    Imagebase:0x7ff684030000
                                                                    File size:494488 bytes
                                                                    MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:16
                                                                    Start time:22:30:11
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:18
                                                                    Start time:22:30:35
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:25
                                                                    Start time:22:31:06
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:c:\windows\system32\svchost.exe -k netsvcs -p -s BITS
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:26
                                                                    Start time:22:31:10
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:27
                                                                    Start time:22:31:34
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Target ID:29
                                                                    Start time:22:31:50
                                                                    Start date:22/05/2022
                                                                    Path:C:\Windows\System32\svchost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                    Imagebase:0x7ff7e8070000
                                                                    File size:51288 bytes
                                                                    MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:8.3%
                                                                      Dynamic/Decrypted Code Coverage:2.4%
                                                                      Signature Coverage:10.4%
                                                                      Total number of Nodes:1893
                                                                      Total number of Limit Nodes:38
                                                                      execution_graph 16200 7ff8be588860 HeapCreate 16201 7ff8be588891 GetVersion 16200->16201 16202 7ff8be58888d 16200->16202 16203 7ff8be5888c1 16201->16203 16204 7ff8be5888a7 HeapSetInformation 16201->16204 16203->16202 16204->16203 17849 7ff8be595260 17850 7ff8be595296 __SehTransFilter _CreateFrameInfo 17849->17850 17851 7ff8be58ed30 _FindAndUnlinkFrame 36 API calls 17850->17851 17852 7ff8be5953e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 17851->17852 16650 7ff8be5a1160 16653 7ff8be594e90 16650->16653 16652 7ff8be5a1179 16654 7ff8be594ebb 16653->16654 16655 7ff8be594ecf 16653->16655 16654->16655 16657 7ff8be58cf50 16654->16657 16655->16652 16658 7ff8be58cf59 16657->16658 16661 7ff8be5939e0 16658->16661 16662 7ff8be5939fa 16661->16662 16671 7ff8be58d430 DecodePointer 16662->16671 16664 7ff8be593a20 16667 7ff8be593a42 16664->16667 16668 7ff8be58be50 terminate 14 API calls 16664->16668 16665 7ff8be593a09 16665->16664 16672 7ff8be58cff0 16665->16672 16684 7ff8be587090 16667->16684 16668->16667 16671->16665 16673 7ff8be58d02a 16672->16673 16674 7ff8be58d1d8 DecodePointer 16673->16674 16675 7ff8be58d19a 16673->16675 16676 7ff8be58d1e8 16674->16676 16677 7ff8be58bd70 _invalid_parameter 17 API calls 16675->16677 16678 7ff8be587090 _exit 33 API calls 16676->16678 16679 7ff8be58d209 16676->16679 16683 7ff8be58d1ce 16676->16683 16677->16683 16678->16679 16681 7ff8be58d289 16679->16681 16687 7ff8be583d00 RtlEncodePointer 16679->16687 16681->16683 16688 7ff8be589360 LeaveCriticalSection 16681->16688 16683->16664 16685 7ff8be587280 _exit 33 API calls 16684->16685 16686 7ff8be5870a9 16685->16686 16686->16655 16687->16681 16688->16683 16689 7ff8be591b64 16690 7ff8be591b9d 16689->16690 16692 7ff8be591bed 16690->16692 16693 7ff8be591c86 16690->16693 16695 7ff8be59ab10 16690->16695 16693->16692 16699 7ff8be599290 16693->16699 16696 7ff8be59ab23 16695->16696 16697 7ff8be59ab35 16695->16697 16696->16693 16697->16696 16698 7ff8be58bd70 _invalid_parameter 17 API calls 16697->16698 16698->16696 16700 7ff8be5992b6 __doserrno 16699->16700 16701 7ff8be5992d8 16699->16701 16700->16692 16702 7ff8be599341 __doserrno 16701->16702 16703 7ff8be59938c 16701->16703 16705 7ff8be58bd70 _invalid_parameter 17 API calls 16702->16705 16704 7ff8be59945b 16703->16704 16708 7ff8be599410 __doserrno 16703->16708 16713 7ff8be59fae0 16704->16713 16705->16700 16711 7ff8be58bd70 _invalid_parameter 17 API calls 16708->16711 16709 7ff8be5994a6 __doserrno 16727 7ff8be59fbc0 LeaveCriticalSection 16709->16727 16711->16700 16714 7ff8be59fb25 16713->16714 16715 7ff8be59fb7a 16713->16715 16718 7ff8be59fb3b InitializeCriticalSectionAndSpinCount 16714->16718 16719 7ff8be59fb56 16714->16719 16716 7ff8be599464 16715->16716 16717 7ff8be59fb81 EnterCriticalSection 16715->16717 16716->16709 16721 7ff8be599520 16716->16721 16717->16716 16718->16719 16728 7ff8be589360 LeaveCriticalSection 16719->16728 16729 7ff8be59f900 16721->16729 16723 7ff8be599545 16724 7ff8be59959d SetFilePointer 16723->16724 16726 7ff8be599552 _dosmaperr 16723->16726 16725 7ff8be5995c1 GetLastError 16724->16725 16724->16726 16725->16726 16726->16709 16727->16700 16728->16715 16730 7ff8be59f913 __doserrno 16729->16730 16731 7ff8be59f935 16729->16731 16730->16723 16732 7ff8be59f99e __doserrno 16731->16732 16734 7ff8be59f9e9 __doserrno 16731->16734 16733 7ff8be58bd70 _invalid_parameter 17 API calls 16732->16733 16733->16730 16734->16730 16735 7ff8be58bd70 _invalid_parameter 17 API calls 16734->16735 16735->16730 17853 7ff8be58405b 17854 7ff8be58406e 17853->17854 17859 7ff8be589360 LeaveCriticalSection 17854->17859 17857 7ff8be584224 17858 7ff8be5841bb _updatetlocinfoEx_nolock 17860 7ff8be589360 LeaveCriticalSection 17858->17860 17859->17858 17860->17857 17861 7ff8be58425a FlsGetValue FlsSetValue 17862 7ff8be584283 17861->17862 16223 1800010e8 16226 18001dbfc 16223->16226 16225 180001151 16231 18001dc49 16226->16231 16227 18001f803 16238 18002191c 16227->16238 16230 18001f7d8 16230->16225 16231->16227 16231->16230 16232 1800171b8 16231->16232 16236 1800171da 16232->16236 16235 18001752f 16235->16231 16236->16235 16242 18000d12c 16236->16242 16246 180005e7c 16236->16246 16250 180019af0 16236->16250 16241 180021941 16238->16241 16239 18000c85c CreateProcessW 16240 180021f5a 16239->16240 16240->16230 16241->16239 16241->16240 16245 18000d176 16242->16245 16244 18000db07 16244->16236 16245->16244 16254 18000c85c 16245->16254 16248 180005eb1 16246->16248 16247 18000c85c CreateProcessW 16247->16248 16248->16247 16249 1800064ba 16248->16249 16249->16236 16253 180019b56 16250->16253 16251 18001aa27 16251->16236 16252 18000c85c CreateProcessW 16252->16253 16253->16251 16253->16252 16255 18000c8c2 16254->16255 16258 1800178a8 16255->16258 16257 18000ca47 16257->16244 16260 180017939 16258->16260 16259 180017a02 CreateProcessW 16259->16257 16260->16259 16740 7ff8be59bb66 16741 7ff8be59bb78 _CrtMemDumpAllObjectsSince wcsxfrm 16740->16741 16742 7ff8be59bc46 16741->16742 16744 7ff8be59b99c 16741->16744 16743 7ff8be58bd70 _invalid_parameter 17 API calls 16742->16743 16747 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 16743->16747 16745 7ff8be59cc93 16744->16745 16748 7ff8be59bada 16744->16748 16746 7ff8be58bd70 _invalid_parameter 17 API calls 16745->16746 16745->16747 16746->16747 16749 7ff8be583280 __GSHandlerCheck 8 API calls 16747->16749 16751 7ff8be58bd70 _invalid_parameter 17 API calls 16748->16751 16750 7ff8be59cd90 16749->16750 16751->16747 16752 7ff8be58e55a 16753 7ff8be58e564 16752->16753 16754 7ff8be58e5c2 RtlLookupFunctionEntry 16753->16754 16755 7ff8be58e601 16753->16755 16754->16755 17863 7ff8be59465b 17873 7ff8be59445a __SehTransFilter 17863->17873 17864 7ff8be5947d7 17865 7ff8be59485b 17864->17865 17866 7ff8be58cf80 _inconsistency 36 API calls 17864->17866 17866->17865 17867 7ff8be59466c __SehTransFilter 17867->17864 17882 7ff8be595bb0 17867->17882 17869 7ff8be594727 17869->17864 17888 7ff8be58e500 17869->17888 17873->17867 17875 7ff8be595180 17873->17875 17876 7ff8be58e500 __GetUnwindTryBlock 37 API calls 17875->17876 17877 7ff8be5951c1 17876->17877 17878 7ff8be5951f0 __SehTransFilter 17877->17878 17896 7ff8be595970 17877->17896 17880 7ff8be58edc0 __SehTransFilter 9 API calls 17878->17880 17881 7ff8be595259 17880->17881 17881->17873 17883 7ff8be595bc6 17882->17883 17884 7ff8be595bc8 17882->17884 17886 7ff8be58cf50 terminate 35 API calls 17883->17886 17887 7ff8be595bda __SehTransFilter 17883->17887 17885 7ff8be58cf80 _inconsistency 36 API calls 17884->17885 17885->17883 17886->17887 17887->17869 17913 7ff8be593b40 17888->17913 17891 7ff8be58e5c2 RtlLookupFunctionEntry 17892 7ff8be58e601 17891->17892 17893 7ff8be58edc0 RtlUnwindEx 17892->17893 17894 7ff8be583280 __GSHandlerCheck 8 API calls 17893->17894 17895 7ff8be58eee7 17894->17895 17895->17864 17897 7ff8be595998 17896->17897 17900 7ff8be5955f0 17897->17900 17899 7ff8be5959d3 __SehTransFilter __AdjustPointer 17899->17878 17901 7ff8be59561e __SehTransFilter 17900->17901 17902 7ff8be595765 17901->17902 17903 7ff8be5956fa _ValidateRead 17901->17903 17911 7ff8be5956aa __SehTransFilter __AdjustPointer 17901->17911 17904 7ff8be59577a _ValidateRead 17902->17904 17905 7ff8be595813 __SehTransFilter 17902->17905 17906 7ff8be58cf80 _inconsistency 36 API calls 17903->17906 17903->17911 17907 7ff8be58cf80 _inconsistency 36 API calls 17904->17907 17904->17911 17908 7ff8be59584d _ValidateRead 17905->17908 17912 7ff8be5958c6 __SehTransFilter _ValidateExecute _ValidateRead 17905->17912 17906->17911 17907->17911 17909 7ff8be58cf80 _inconsistency 36 API calls 17908->17909 17908->17911 17909->17911 17910 7ff8be58cf80 _inconsistency 36 API calls 17910->17911 17911->17899 17912->17910 17912->17911 17916 7ff8be593a60 17913->17916 17917 7ff8be593a7b 17916->17917 17918 7ff8be593a7d 17916->17918 17920 7ff8be58cf80 _inconsistency 36 API calls 17917->17920 17921 7ff8be58e539 17917->17921 17919 7ff8be58cf80 _inconsistency 36 API calls 17918->17919 17919->17917 17920->17921 17921->17891 17921->17892 16756 7ff8be59595c 16757 7ff8be58cf50 terminate 35 API calls 16756->16757 16758 7ff8be595961 16757->16758 16421 7ff8be588670 GetEnvironmentStringsW 16422 7ff8be588690 16421->16422 16424 7ff8be588697 WideCharToMultiByte 16421->16424 16425 7ff8be588733 16424->16425 16426 7ff8be58875f FreeEnvironmentStringsW 16424->16426 16425->16426 16427 7ff8be58876e WideCharToMultiByte 16425->16427 16426->16422 16428 7ff8be5887c2 FreeEnvironmentStringsW 16427->16428 16429 7ff8be5887aa 16427->16429 16428->16422 16429->16428 16759 7ff8be5a1370 16762 7ff8be59af60 16759->16762 16763 7ff8be59af74 16762->16763 16764 7ff8be59af98 LeaveCriticalSection 16762->16764 16767 7ff8be589360 LeaveCriticalSection 16763->16767 16766 7ff8be59af96 16764->16766 16767->16766 16477 7ff8be583471 16478 7ff8be58347a 16477->16478 16487 7ff8be5834bc 16477->16487 16479 7ff8be583496 16478->16479 16490 7ff8be5870b0 16478->16490 16480 7ff8be587d00 _ioterm DeleteCriticalSection 16479->16480 16482 7ff8be58349b 16480->16482 16483 7ff8be583e00 3 API calls 16482->16483 16484 7ff8be5834a0 16483->16484 16489 7ff8be5888d0 HeapDestroy 16484->16489 16486 7ff8be5834a5 16486->16487 16488 7ff8be583e00 3 API calls 16486->16488 16488->16487 16489->16486 16493 7ff8be587280 16490->16493 16494 7ff8be587296 _exit 16493->16494 16495 7ff8be58744e 16494->16495 16496 7ff8be5872c7 DecodePointer 16494->16496 16503 7ff8be587368 _initterm 16494->16503 16497 7ff8be58745e 16495->16497 16537 7ff8be587520 16495->16537 16498 7ff8be5872e5 DecodePointer 16496->16498 16496->16503 16500 7ff8be5870c3 16497->16500 16501 7ff8be587520 _exit LeaveCriticalSection 16497->16501 16511 7ff8be587314 16498->16511 16500->16479 16502 7ff8be587479 16501->16502 16504 7ff8be5874e0 __crtExitProcess 3 API calls 16502->16504 16503->16495 16517 7ff8be586210 16503->16517 16504->16500 16508 7ff8be58736d DecodePointer 16516 7ff8be583d00 RtlEncodePointer 16508->16516 16511->16503 16511->16508 16514 7ff8be587391 DecodePointer DecodePointer 16511->16514 16515 7ff8be583d00 RtlEncodePointer 16511->16515 16512 7ff8be587449 16530 7ff8be586f10 16512->16530 16514->16511 16515->16511 16516->16511 16518 7ff8be586229 16517->16518 16519 7ff8be58628f 16518->16519 16521 7ff8be5862cb 16518->16521 16520 7ff8be58bd70 _invalid_parameter 17 API calls 16519->16520 16522 7ff8be5862c3 16520->16522 16540 7ff8be589360 LeaveCriticalSection 16521->16540 16522->16495 16524 7ff8be587100 16522->16524 16525 7ff8be587112 16524->16525 16526 7ff8be5871e4 DecodePointer 16525->16526 16527 7ff8be5871fe 16526->16527 16541 7ff8be583d00 RtlEncodePointer 16527->16541 16529 7ff8be587219 16529->16512 16542 7ff8be5863e0 16530->16542 16532 7ff8be586f33 16533 7ff8be586f8e 16532->16533 16550 7ff8be586660 16532->16550 16535 7ff8be583280 __GSHandlerCheck 8 API calls 16533->16535 16536 7ff8be586fa7 16535->16536 16536->16495 16607 7ff8be589360 LeaveCriticalSection 16537->16607 16539 7ff8be58752e 16539->16497 16540->16522 16541->16529 16545 7ff8be5863f1 16542->16545 16543 7ff8be586447 16546 7ff8be58bd70 _invalid_parameter 17 API calls 16543->16546 16544 7ff8be586480 16549 7ff8be586504 16544->16549 16554 7ff8be589360 LeaveCriticalSection 16544->16554 16545->16543 16545->16544 16547 7ff8be58647b 16546->16547 16547->16532 16549->16532 16551 7ff8be586681 _CrtMemDumpAllObjectsSince 16550->16551 16555 7ff8be586850 16551->16555 16553 7ff8be586698 _LocaleUpdate::~_LocaleUpdate 16553->16533 16554->16547 16556 7ff8be586871 16555->16556 16557 7ff8be586ba6 16556->16557 16560 7ff8be5868ed _CrtIsValidPointer 16556->16560 16585 7ff8be589360 LeaveCriticalSection 16557->16585 16559 7ff8be586bb0 16559->16553 16561 7ff8be58695e IsBadReadPtr 16560->16561 16562 7ff8be586976 16560->16562 16572 7ff8be58692f 16560->16572 16561->16562 16563 7ff8be586ad2 16562->16563 16564 7ff8be586a29 16562->16564 16565 7ff8be586b2d 16563->16565 16566 7ff8be586add 16563->16566 16567 7ff8be586abe 16564->16567 16568 7ff8be586a86 IsBadReadPtr 16564->16568 16571 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16565->16571 16565->16572 16570 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 16566->16570 16573 7ff8be586bf0 16567->16573 16568->16567 16568->16572 16570->16572 16571->16572 16572->16553 16574 7ff8be586c28 16573->16574 16575 7ff8be586e25 _LocaleUpdate::~_LocaleUpdate 16574->16575 16576 7ff8be586c7a _CrtMemDumpAllObjectsSince 16574->16576 16577 7ff8be583280 __GSHandlerCheck 8 API calls 16575->16577 16580 7ff8be586ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 16576->16580 16586 7ff8be58c260 16576->16586 16578 7ff8be586e89 16577->16578 16578->16572 16590 7ff8be58c0c0 16580->16590 16582 7ff8be586e12 16582->16572 16583 7ff8be586dc7 16583->16582 16593 7ff8be586ea0 16583->16593 16585->16559 16587 7ff8be58c286 _CrtMemDumpAllObjectsSince wcsxfrm 16586->16587 16588 7ff8be58f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 16587->16588 16589 7ff8be58c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16587->16589 16588->16589 16589->16580 16597 7ff8be592260 16590->16597 16592 7ff8be58c103 16592->16583 16594 7ff8be586ed1 16593->16594 16595 7ff8be586ebd 16593->16595 16594->16582 16595->16594 16596 7ff8be58be00 _invalid_parameter 16 API calls 16595->16596 16596->16594 16599 7ff8be59228b 16597->16599 16598 7ff8be5922e1 16600 7ff8be58bd70 _invalid_parameter 17 API calls 16598->16600 16599->16598 16602 7ff8be59231f 16599->16602 16604 7ff8be592315 _calloc_dbg_impl 16600->16604 16601 7ff8be592385 16603 7ff8be58bd70 _invalid_parameter 17 API calls 16601->16603 16602->16601 16605 7ff8be5923c3 _calloc_dbg_impl 16602->16605 16603->16604 16604->16592 16605->16604 16606 7ff8be58bd70 _invalid_parameter 17 API calls 16605->16606 16606->16604 16607->16539 16779 7ff8be59e16f 16780 7ff8be59e17c _CrtMemDumpAllObjectsSince wcsxfrm get_int64_arg 16779->16780 16781 7ff8be59eadf 16780->16781 16789 7ff8be59da75 16780->16789 16802 7ff8be59eec0 16780->16802 16806 7ff8be59ef10 16781->16806 16784 7ff8be59eafd 16785 7ff8be59eb33 16784->16785 16787 7ff8be59eec0 25 API calls 16784->16787 16786 7ff8be59ec29 16785->16786 16800 7ff8be59eb49 _CrtMemDumpAllObjectsSince 16785->16800 16788 7ff8be59ef10 25 API calls 16786->16788 16787->16785 16790 7ff8be59ebda 16788->16790 16791 7ff8be59eca1 16789->16791 16793 7ff8be59dbb5 16789->16793 16790->16789 16794 7ff8be59eec0 25 API calls 16790->16794 16792 7ff8be58bd70 _invalid_parameter 17 API calls 16791->16792 16796 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 16791->16796 16792->16796 16798 7ff8be58bd70 _invalid_parameter 17 API calls 16793->16798 16794->16789 16795 7ff8be583280 __GSHandlerCheck 8 API calls 16797 7ff8be59ed9e 16795->16797 16796->16795 16798->16796 16800->16790 16810 7ff8be59f000 16800->16810 16817 7ff8be59ee40 16800->16817 16803 7ff8be59eed7 16802->16803 16804 7ff8be59ef07 16803->16804 16805 7ff8be59ee40 25 API calls 16803->16805 16804->16781 16805->16803 16807 7ff8be59ef2c 16806->16807 16808 7ff8be59ef4d 16807->16808 16809 7ff8be59ee40 25 API calls 16807->16809 16808->16784 16809->16807 16811 7ff8be59f026 _CrtMemDumpAllObjectsSince wcsxfrm 16810->16811 16814 7ff8be59f031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16810->16814 16812 7ff8be59f276 _CrtMemDumpAllObjectsSince 16811->16812 16811->16814 16815 7ff8be59f146 _CrtMemDumpAllObjectsSince 16811->16815 16813 7ff8be59f29d MultiByteToWideChar 16812->16813 16813->16814 16814->16800 16815->16814 16816 7ff8be59f1b5 MultiByteToWideChar 16815->16816 16816->16814 16818 7ff8be59ee62 16817->16818 16820 7ff8be59ee6e 16818->16820 16821 7ff8be59f360 16818->16821 16820->16800 16822 7ff8be59f399 16821->16822 16855 7ff8be59f622 16821->16855 16856 7ff8be59afb0 16822->16856 16824 7ff8be5a0170 23 API calls 16832 7ff8be59f4f2 16824->16832 16825 7ff8be583280 __GSHandlerCheck 8 API calls 16828 7ff8be59f7c5 16825->16828 16827 7ff8be59f3ed 16830 7ff8be59f4c7 16827->16830 16833 7ff8be59afb0 _fflush_nolock 17 API calls 16827->16833 16828->16820 16829 7ff8be59afb0 _fflush_nolock 17 API calls 16831 7ff8be59f3b8 16829->16831 16830->16832 16860 7ff8be5a0170 16830->16860 16831->16827 16836 7ff8be59afb0 _fflush_nolock 17 API calls 16831->16836 16832->16825 16835 7ff8be59f43d 16833->16835 16837 7ff8be59f484 16835->16837 16839 7ff8be59afb0 _fflush_nolock 17 API calls 16835->16839 16838 7ff8be59f3ca 16836->16838 16837->16830 16842 7ff8be59f561 16837->16842 16840 7ff8be59afb0 _fflush_nolock 17 API calls 16838->16840 16841 7ff8be59f44f 16839->16841 16840->16827 16841->16837 16845 7ff8be59afb0 _fflush_nolock 17 API calls 16841->16845 16843 7ff8be59afb0 _fflush_nolock 17 API calls 16842->16843 16844 7ff8be59f56e 16843->16844 16846 7ff8be59f5b8 16844->16846 16848 7ff8be59afb0 _fflush_nolock 17 API calls 16844->16848 16847 7ff8be59f461 16845->16847 16846->16855 16868 7ff8be59b530 16846->16868 16849 7ff8be59afb0 _fflush_nolock 17 API calls 16847->16849 16850 7ff8be59f580 16848->16850 16849->16837 16850->16846 16852 7ff8be59afb0 _fflush_nolock 17 API calls 16850->16852 16853 7ff8be59f592 16852->16853 16854 7ff8be59afb0 _fflush_nolock 17 API calls 16853->16854 16854->16846 16855->16824 16855->16832 16858 7ff8be59afc1 16856->16858 16857 7ff8be59b04b 16857->16827 16857->16829 16858->16857 16859 7ff8be58bd70 _invalid_parameter 17 API calls 16858->16859 16859->16857 16861 7ff8be5a0185 16860->16861 16862 7ff8be59afb0 _fflush_nolock 17 API calls 16861->16862 16863 7ff8be5a01c7 16862->16863 16864 7ff8be5a01dc 16863->16864 16865 7ff8be59ab10 17 API calls 16863->16865 16866 7ff8be5a0326 16863->16866 16864->16832 16865->16866 16866->16864 16867 7ff8be599290 23 API calls 16866->16867 16867->16864 16871 7ff8be59b090 16868->16871 16870 7ff8be59b56c 16870->16855 16872 7ff8be59b0b7 16871->16872 16873 7ff8be59b168 16872->16873 16874 7ff8be59b1a6 _CrtMemDumpAllObjectsSince 16872->16874 16882 7ff8be59b0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 16872->16882 16875 7ff8be58bd70 _invalid_parameter 17 API calls 16873->16875 16876 7ff8be59b347 _CrtMemDumpAllObjectsSince 16874->16876 16877 7ff8be59b1cf 16874->16877 16875->16882 16878 7ff8be59b359 WideCharToMultiByte 16876->16878 16881 7ff8be58bd70 _invalid_parameter 17 API calls 16877->16881 16877->16882 16879 7ff8be59b3ab 16878->16879 16880 7ff8be59b3c1 GetLastError 16879->16880 16879->16882 16880->16882 16883 7ff8be59b3d0 _calloc_dbg_impl 16880->16883 16881->16882 16882->16870 16883->16882 16884 7ff8be58bd70 _invalid_parameter 17 API calls 16883->16884 16884->16882 17946 7ff8be58ae40 17947 7ff8be58d490 std::exception::_Copy_str 17 API calls 17946->17947 17948 7ff8be58ae59 17947->17948 17949 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17948->17949 17950 7ff8be58ae86 std::exception::_Copy_str 17949->17950 17953 7ff8be58af3a std::exception::_Copy_str 17950->17953 17969 7ff8be590fd0 17950->17969 17952 7ff8be58af0d 17954 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17952->17954 17955 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 17953->17955 17956 7ff8be58b2e0 17953->17956 17954->17953 17955->17956 17957 7ff8be58b33e 17956->17957 17958 7ff8be58d490 std::exception::_Copy_str 17 API calls 17956->17958 17959 7ff8be590cc0 25 API calls 17957->17959 17960 7ff8be58b311 17958->17960 17961 7ff8be58b358 17959->17961 17962 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17960->17962 17963 7ff8be58b37d 17961->17963 17964 7ff8be58cff0 terminate 34 API calls 17961->17964 17962->17957 17966 7ff8be583280 __GSHandlerCheck 8 API calls 17963->17966 17965 7ff8be58b373 17964->17965 17967 7ff8be587090 _exit 33 API calls 17965->17967 17968 7ff8be58b3a0 17966->17968 17967->17963 17971 7ff8be590ff7 17969->17971 17972 7ff8be590ff0 __SehTransFilter 17969->17972 17970 7ff8be591055 17973 7ff8be58bd70 _invalid_parameter 17 API calls 17970->17973 17971->17970 17974 7ff8be591093 _calloc_dbg_impl 17971->17974 17972->17952 17973->17972 17974->17972 17975 7ff8be59111a 17974->17975 17977 7ff8be591158 17974->17977 17976 7ff8be58bd70 _invalid_parameter 17 API calls 17975->17976 17976->17972 17977->17972 17978 7ff8be58bd70 _invalid_parameter 17 API calls 17977->17978 17978->17972 17979 7ff8be59dc41 17980 7ff8be59ee40 25 API calls 17979->17980 17983 7ff8be59da75 17980->17983 17981 7ff8be59eca1 17982 7ff8be58bd70 _invalid_parameter 17 API calls 17981->17982 17986 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 17981->17986 17982->17986 17983->17981 17984 7ff8be59dbb5 17983->17984 17988 7ff8be58bd70 _invalid_parameter 17 API calls 17984->17988 17985 7ff8be583280 __GSHandlerCheck 8 API calls 17987 7ff8be59ed9e 17985->17987 17986->17985 17988->17986 17989 7ff8be589240 17990 7ff8be58924d 17989->17990 17991 7ff8be58925f 17989->17991 17992 7ff8be589281 InitializeCriticalSectionAndSpinCount 17991->17992 17993 7ff8be589295 17991->17993 17992->17993 17995 7ff8be589360 LeaveCriticalSection 17993->17995 17995->17990 17996 7ff8be5a1040 17999 7ff8be58e8f0 17996->17999 17998 7ff8be5a108f 18000 7ff8be58e90d 17999->18000 18003 7ff8be593cc0 18000->18003 18002 7ff8be58e980 18002->17998 18004 7ff8be593cdd 18003->18004 18006 7ff8be593d82 18004->18006 18011 7ff8be593ef3 __SehTransFilter 18004->18011 18014 7ff8be593d62 18004->18014 18008 7ff8be593dc8 18006->18008 18012 7ff8be593e40 18006->18012 18006->18014 18007 7ff8be593ebd 18007->18014 18028 7ff8be58e790 18007->18028 18009 7ff8be593a60 __StateFromControlPc 36 API calls 18008->18009 18013 7ff8be593dec 18009->18013 18011->18014 18035 7ff8be5940b0 18011->18035 18012->18007 18015 7ff8be593e93 18012->18015 18016 7ff8be58cf80 _inconsistency 36 API calls 18012->18016 18017 7ff8be593e08 18013->18017 18018 7ff8be58cf80 _inconsistency 36 API calls 18013->18018 18014->18002 18019 7ff8be594f20 __SehTransFilter 36 API calls 18015->18019 18016->18015 18021 7ff8be594f20 18017->18021 18018->18017 18019->18007 18080 7ff8be593b70 18021->18080 18023 7ff8be58cf80 _inconsistency 36 API calls 18027 7ff8be594f55 __SehTransFilter _SetImageBase __SetState 18023->18027 18024 7ff8be595103 18025 7ff8be59514a __SetState 18024->18025 18026 7ff8be58cf80 _inconsistency 36 API calls 18024->18026 18025->18014 18026->18025 18027->18023 18027->18024 18029 7ff8be58e500 __GetUnwindTryBlock 37 API calls 18028->18029 18030 7ff8be58e7bc 18029->18030 18031 7ff8be593b40 __StateFromControlPc 36 API calls 18030->18031 18032 7ff8be58e7d0 __SehTransFilter 18031->18032 18033 7ff8be594f20 __SehTransFilter 36 API calls 18032->18033 18034 7ff8be58e81e 18033->18034 18034->18014 18036 7ff8be593b40 __StateFromControlPc 36 API calls 18035->18036 18037 7ff8be5940ea 18036->18037 18038 7ff8be58e500 __GetUnwindTryBlock 37 API calls 18037->18038 18039 7ff8be594110 18038->18039 18084 7ff8be593c70 18039->18084 18042 7ff8be594133 __SetState 18087 7ff8be593c00 18042->18087 18043 7ff8be594176 18044 7ff8be593c70 __GetUnwindTryBlock 37 API calls 18043->18044 18045 7ff8be594174 18044->18045 18047 7ff8be5941af _ValidateRead _SetThrowImageBase 18045->18047 18048 7ff8be58cf80 _inconsistency 36 API calls 18045->18048 18050 7ff8be594347 18047->18050 18056 7ff8be594235 18047->18056 18065 7ff8be58cf80 _inconsistency 36 API calls 18047->18065 18067 7ff8be59428e 18047->18067 18048->18047 18049 7ff8be5947d9 18052 7ff8be5947f3 18049->18052 18053 7ff8be594847 18049->18053 18057 7ff8be5947d7 18049->18057 18050->18049 18051 7ff8be5943f5 18050->18051 18060 7ff8be59466c __SehTransFilter 18051->18060 18096 7ff8be58ea30 18051->18096 18101 7ff8be594960 18052->18101 18055 7ff8be58cf50 terminate 35 API calls 18053->18055 18055->18057 18056->18014 18057->18056 18059 7ff8be58cf80 _inconsistency 36 API calls 18057->18059 18059->18056 18060->18057 18061 7ff8be595bb0 __SehTransFilter 36 API calls 18060->18061 18062 7ff8be594727 18061->18062 18062->18057 18063 7ff8be58e500 __GetUnwindTryBlock 37 API calls 18062->18063 18064 7ff8be594767 18063->18064 18066 7ff8be58edc0 __SehTransFilter 9 API calls 18064->18066 18065->18067 18066->18057 18068 7ff8be58cf80 _inconsistency 36 API calls 18067->18068 18069 7ff8be5942fa 18067->18069 18068->18069 18069->18050 18071 7ff8be595bb0 __SehTransFilter 36 API calls 18069->18071 18070 7ff8be594450 __SehTransFilter 18070->18060 18072 7ff8be595180 __SehTransFilter 38 API calls 18070->18072 18073 7ff8be594340 __SehTransFilter 18071->18073 18072->18070 18073->18050 18074 7ff8be594393 18073->18074 18075 7ff8be59435a __SehTransFilter 18073->18075 18076 7ff8be58cf50 terminate 35 API calls 18074->18076 18090 7ff8be594870 18075->18090 18076->18050 18081 7ff8be593b9a 18080->18081 18082 7ff8be593ba9 18080->18082 18083 7ff8be593b40 __StateFromControlPc 36 API calls 18081->18083 18082->18027 18083->18082 18085 7ff8be58e500 __GetUnwindTryBlock 37 API calls 18084->18085 18086 7ff8be593c9c 18085->18086 18086->18042 18086->18043 18088 7ff8be58e500 __GetUnwindTryBlock 37 API calls 18087->18088 18089 7ff8be593c31 18088->18089 18089->18045 18111 7ff8be59d4e0 18090->18111 18093 7ff8be59d320 18095 7ff8be59d375 18093->18095 18094 7ff8be59d3ba RaiseException 18094->18050 18095->18094 18097 7ff8be593b40 __StateFromControlPc 36 API calls 18096->18097 18098 7ff8be58ea6f 18097->18098 18099 7ff8be58cf80 _inconsistency 36 API calls 18098->18099 18100 7ff8be58ea7a 18098->18100 18099->18100 18100->18070 18103 7ff8be594990 18101->18103 18108 7ff8be59498b 18101->18108 18102 7ff8be5949b2 __SehTransFilter 18104 7ff8be594a41 18102->18104 18105 7ff8be58cf80 _inconsistency 36 API calls 18102->18105 18102->18108 18103->18102 18114 7ff8be583d00 RtlEncodePointer 18103->18114 18106 7ff8be58ea30 __SehTransFilter 36 API calls 18104->18106 18105->18104 18109 7ff8be594a8e __SehTransFilter 18106->18109 18108->18057 18109->18108 18110 7ff8be595180 __SehTransFilter 38 API calls 18109->18110 18110->18108 18112 7ff8be59d660 std::exception::_Copy_str 17 API calls 18111->18112 18113 7ff8be59437d 18112->18113 18113->18093 18114->18102 18115 7ff8be5a0e40 18116 7ff8be5a0e50 18115->18116 18117 7ff8be5a0e5e 18115->18117 18116->18117 18118 7ff8be583e00 3 API calls 18116->18118 18118->18117 18119 7ff8be58443c 18120 7ff8be58444c 18119->18120 18123 7ff8be589360 LeaveCriticalSection 18120->18123 18122 7ff8be5848be 18123->18122 16897 7ff8be599939 16898 7ff8be599951 __doserrno 16897->16898 16899 7ff8be58bd70 _invalid_parameter 17 API calls 16898->16899 16900 7ff8be5999d7 16899->16900 16901 7ff8be583280 __GSHandlerCheck 8 API calls 16900->16901 16902 7ff8be59a9f5 16901->16902 18124 7ff8be593e3b 18125 7ff8be593ec7 18124->18125 18126 7ff8be58e790 __SehTransFilter 37 API calls 18125->18126 18127 7ff8be593ee4 18126->18127 16416 7ff8be588040 16417 7ff8be58805b GetModuleFileNameA 16416->16417 16418 7ff8be588056 16416->16418 16420 7ff8be588083 16417->16420 16419 7ff8be58aa40 __initmbctable 24 API calls 16418->16419 16419->16417 16914 7ff8be59f53e 16915 7ff8be59f55c 16914->16915 16916 7ff8be59f74d 16915->16916 16917 7ff8be5a0170 23 API calls 16915->16917 16918 7ff8be583280 __GSHandlerCheck 8 API calls 16916->16918 16917->16916 16919 7ff8be59f7c5 16918->16919 16920 7ff8be581140 16921 7ff8be58116a 16920->16921 16922 7ff8be58118c 16921->16922 16923 7ff8be58119a FileTimeToSystemTime 16921->16923 16925 7ff8be583280 __GSHandlerCheck 8 API calls 16922->16925 16923->16922 16924 7ff8be5811ae 16923->16924 16928 7ff8be581000 GetThreadLocale GetDateFormatA 16924->16928 16927 7ff8be5811d0 16925->16927 16929 7ff8be58105b 16928->16929 16930 7ff8be581062 GetThreadLocale GetTimeFormatA 16928->16930 16929->16922 16930->16929 18128 7ff8be587640 GetStartupInfoW 18136 7ff8be587676 _calloc_dbg 18128->18136 18129 7ff8be587ce0 SetHandleCount 18140 7ff8be587689 18129->18140 18130 7ff8be587c7b 18130->18129 18131 7ff8be587b95 GetStdHandle 18131->18130 18133 7ff8be587bb9 18131->18133 18132 7ff8be587ab9 18132->18129 18132->18130 18132->18131 18133->18130 18134 7ff8be587bc8 GetFileType 18133->18134 18134->18130 18135 7ff8be587beb InitializeCriticalSectionAndSpinCount 18134->18135 18135->18130 18135->18140 18136->18132 18138 7ff8be587a19 GetFileType 18136->18138 18139 7ff8be587a32 InitializeCriticalSectionAndSpinCount 18136->18139 18136->18140 18138->18132 18138->18139 18139->18132 18139->18140 16931 7ff8be5a0550 16932 7ff8be5a0575 16931->16932 16933 7ff8be5a055e 16931->16933 16933->16932 16934 7ff8be5a0568 CloseHandle 16933->16934 16934->16932 18146 7ff8be58a057 18147 7ff8be58a061 18146->18147 18148 7ff8be58a234 18147->18148 18154 7ff8be58a08e __initmbctable 18147->18154 18149 7ff8be58a25d IsValidCodePage 18148->18149 18153 7ff8be58a22d __initmbctable 18148->18153 18152 7ff8be58a27b GetCPInfo 18149->18152 18149->18153 18150 7ff8be583280 __GSHandlerCheck 8 API calls 18151 7ff8be58a470 18150->18151 18152->18153 18156 7ff8be58a295 __initmbctable 18152->18156 18153->18150 18155 7ff8be58a5e0 __initmbctable 19 API calls 18154->18155 18155->18153 18157 7ff8be58a5e0 __initmbctable 19 API calls 18156->18157 18157->18153 16950 7ff8be585357 16953 7ff8be589360 LeaveCriticalSection 16950->16953 16952 7ff8be585361 16953->16952 18158 7ff8be58d04a 18159 7ff8be58d1d8 DecodePointer 18158->18159 18160 7ff8be58d1e8 18159->18160 18161 7ff8be587090 _exit 33 API calls 18160->18161 18162 7ff8be58d209 18160->18162 18166 7ff8be58d1f0 18160->18166 18161->18162 18164 7ff8be58d289 18162->18164 18167 7ff8be583d00 RtlEncodePointer 18162->18167 18164->18166 18168 7ff8be589360 LeaveCriticalSection 18164->18168 18167->18164 18168->18166 18169 7ff8be585854 18170 7ff8be58585b _calloc_dbg_impl 18169->18170 18171 7ff8be58c020 _free_base 2 API calls 18170->18171 18172 7ff8be5859d5 18171->18172 16977 7ff8be58cb4f 16978 7ff8be58cb5c 16977->16978 16981 7ff8be58cbeb GetStdHandle 16978->16981 16982 7ff8be58cc99 16978->16982 17005 7ff8be58cc94 16978->17005 16979 7ff8be583280 __GSHandlerCheck 8 API calls 16980 7ff8be58cf0f 16979->16980 16983 7ff8be58cc07 std::exception::_Copy_str 16981->16983 16981->17005 16982->17005 17006 7ff8be591640 16982->17006 16985 7ff8be58cc73 WriteFile 16983->16985 16983->17005 16985->17005 16986 7ff8be58cd10 16987 7ff8be587ff0 _invoke_watson_if_error 16 API calls 16986->16987 16988 7ff8be58cd3d GetModuleFileNameW 16987->16988 16989 7ff8be58cd68 16988->16989 16992 7ff8be58cdb1 16988->16992 16990 7ff8be591640 17 API calls 16989->16990 16991 7ff8be58cd84 16990->16991 16994 7ff8be587ff0 _invoke_watson_if_error 16 API calls 16991->16994 16993 7ff8be58ce5e 16992->16993 17016 7ff8be593380 16992->17016 17026 7ff8be592d80 16993->17026 16994->16992 16996 7ff8be58ce76 16998 7ff8be587ff0 _invoke_watson_if_error 16 API calls 16996->16998 17000 7ff8be58cea3 16998->17000 16999 7ff8be58ce31 17001 7ff8be587ff0 _invoke_watson_if_error 16 API calls 16999->17001 17002 7ff8be592d80 17 API calls 17000->17002 17001->16993 17003 7ff8be58ceb9 17002->17003 17004 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17003->17004 17004->17005 17005->16979 17007 7ff8be591661 17006->17007 17008 7ff8be5916c2 17007->17008 17010 7ff8be591700 _calloc_dbg_impl 17007->17010 17009 7ff8be58bd70 _invalid_parameter 17 API calls 17008->17009 17014 7ff8be5916f6 _calloc_dbg_impl 17009->17014 17011 7ff8be5917f4 17010->17011 17012 7ff8be591832 _calloc_dbg_impl 17010->17012 17013 7ff8be58bd70 _invalid_parameter 17 API calls 17011->17013 17012->17014 17015 7ff8be58bd70 _invalid_parameter 17 API calls 17012->17015 17013->17014 17014->16986 17015->17014 17017 7ff8be5933a6 17016->17017 17018 7ff8be59342f 17017->17018 17020 7ff8be59346d _calloc_dbg_impl 17017->17020 17023 7ff8be5933bc _calloc_dbg_impl 17017->17023 17019 7ff8be58bd70 _invalid_parameter 17 API calls 17018->17019 17019->17023 17021 7ff8be5935fb 17020->17021 17020->17023 17024 7ff8be593639 _calloc_dbg_impl 17020->17024 17022 7ff8be58bd70 _invalid_parameter 17 API calls 17021->17022 17022->17023 17023->16999 17024->17023 17025 7ff8be58bd70 _invalid_parameter 17 API calls 17024->17025 17025->17023 17027 7ff8be592da1 17026->17027 17028 7ff8be592e02 17027->17028 17030 7ff8be592e40 _calloc_dbg_impl 17027->17030 17029 7ff8be58bd70 _invalid_parameter 17 API calls 17028->17029 17034 7ff8be592e36 _calloc_dbg_impl 17029->17034 17031 7ff8be592f34 17030->17031 17032 7ff8be592f72 _calloc_dbg_impl 17030->17032 17035 7ff8be58bd70 _invalid_parameter 17 API calls 17031->17035 17033 7ff8be5930b5 17032->17033 17036 7ff8be5930f3 _calloc_dbg_impl 17032->17036 17037 7ff8be58bd70 _invalid_parameter 17 API calls 17033->17037 17034->16996 17035->17034 17036->17034 17038 7ff8be58bd70 _invalid_parameter 17 API calls 17036->17038 17037->17034 17038->17034 17039 7ff8be594920 17042 7ff8be59d530 17039->17042 17045 7ff8be59d580 17042->17045 17046 7ff8be59d59a std::exception::_Tidy 17045->17046 17047 7ff8be59493d 17045->17047 17046->17047 17049 7ff8be59d660 17046->17049 17050 7ff8be59d676 std::exception::_Copy_str malloc 17049->17050 17052 7ff8be59d6bf 17049->17052 17051 7ff8be58d490 std::exception::_Copy_str 17 API calls 17050->17051 17050->17052 17051->17052 17052->17047 16205 7ff8be58461b 16207 7ff8be584625 _calloc_dbg_impl 16205->16207 16209 7ff8be589360 LeaveCriticalSection 16207->16209 16208 7ff8be5848be 16209->16208 18177 7ff8be59e424 18178 7ff8be59e469 _CrtMemDumpAllObjectsSince 18177->18178 18179 7ff8be59e588 DecodePointer 18178->18179 18180 7ff8be59e5fd _CrtMemDumpAllObjectsSince 18179->18180 18181 7ff8be59e61b DecodePointer 18180->18181 18182 7ff8be59e642 _CrtMemDumpAllObjectsSince 18180->18182 18181->18182 18183 7ff8be59e666 DecodePointer 18182->18183 18185 7ff8be59e68d std::exception::_Copy_str 18182->18185 18183->18185 18184 7ff8be59eadf 18187 7ff8be59ef10 25 API calls 18184->18187 18185->18184 18186 7ff8be59eec0 25 API calls 18185->18186 18193 7ff8be59da75 18185->18193 18186->18184 18188 7ff8be59eafd 18187->18188 18189 7ff8be59eb33 18188->18189 18191 7ff8be59eec0 25 API calls 18188->18191 18190 7ff8be59ec29 18189->18190 18204 7ff8be59eb49 _CrtMemDumpAllObjectsSince 18189->18204 18192 7ff8be59ef10 25 API calls 18190->18192 18191->18189 18194 7ff8be59ebda 18192->18194 18195 7ff8be59eca1 18193->18195 18197 7ff8be59dbb5 18193->18197 18194->18193 18198 7ff8be59eec0 25 API calls 18194->18198 18196 7ff8be58bd70 _invalid_parameter 17 API calls 18195->18196 18200 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 18195->18200 18196->18200 18202 7ff8be58bd70 _invalid_parameter 17 API calls 18197->18202 18198->18193 18199 7ff8be583280 __GSHandlerCheck 8 API calls 18201 7ff8be59ed9e 18199->18201 18200->18199 18202->18200 18203 7ff8be59f000 wcsxfrm 2 API calls 18203->18204 18204->18194 18204->18203 18205 7ff8be59ee40 25 API calls 18204->18205 18205->18204 18206 7ff8be585a25 18207 7ff8be585a37 18206->18207 18208 7ff8be58bd70 _invalid_parameter 17 API calls 18207->18208 18209 7ff8be585aaf 18208->18209 18210 7ff8be58e830 18211 7ff8be58e857 18210->18211 18212 7ff8be593cc0 __SehTransFilter 39 API calls 18211->18212 18213 7ff8be58e8e3 18212->18213 18214 7ff8be59d830 18215 7ff8be59d8aa 18214->18215 18216 7ff8be59d926 18215->18216 18218 7ff8be59d97b 18215->18218 18217 7ff8be58bd70 _invalid_parameter 17 API calls 18216->18217 18221 7ff8be59d95a _LocaleUpdate::~_LocaleUpdate 18217->18221 18219 7ff8be59d9ee 18218->18219 18226 7ff8be59da43 18218->18226 18220 7ff8be58bd70 _invalid_parameter 17 API calls 18219->18220 18220->18221 18222 7ff8be583280 __GSHandlerCheck 8 API calls 18221->18222 18223 7ff8be59ed9e 18222->18223 18224 7ff8be59eca1 18224->18221 18225 7ff8be58bd70 _invalid_parameter 17 API calls 18224->18225 18225->18221 18226->18224 18227 7ff8be59dbb5 18226->18227 18228 7ff8be58bd70 _invalid_parameter 17 API calls 18227->18228 18228->18221 18238 7ff8be59c435 18239 7ff8be59c479 _CrtMemDumpAllObjectsSince 18238->18239 18240 7ff8be59c598 DecodePointer 18239->18240 18241 7ff8be59c60d _CrtMemDumpAllObjectsSince 18240->18241 18242 7ff8be59c62b DecodePointer 18241->18242 18243 7ff8be59c652 _CrtMemDumpAllObjectsSince 18241->18243 18242->18243 18244 7ff8be59c676 DecodePointer 18243->18244 18254 7ff8be59c69d std::exception::_Copy_str 18243->18254 18244->18254 18245 7ff8be59b99c 18246 7ff8be59cc93 18245->18246 18250 7ff8be59bada 18245->18250 18247 7ff8be58bd70 _invalid_parameter 17 API calls 18246->18247 18249 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 18246->18249 18247->18249 18248 7ff8be59b530 wctomb_s 19 API calls 18248->18254 18251 7ff8be583280 __GSHandlerCheck 8 API calls 18249->18251 18253 7ff8be58bd70 _invalid_parameter 17 API calls 18250->18253 18252 7ff8be59cd90 18251->18252 18253->18249 18254->18245 18254->18248 17088 7ff8be589328 17089 7ff8be589336 EnterCriticalSection 17088->17089 17090 7ff8be58932c 17088->17090 17090->17089 17091 7ff8be58b12b 17092 7ff8be58b14c 17091->17092 17093 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 17092->17093 17094 7ff8be58b2e0 17092->17094 17093->17094 17095 7ff8be58b33e 17094->17095 17096 7ff8be58d490 std::exception::_Copy_str 17 API calls 17094->17096 17107 7ff8be590cc0 17095->17107 17098 7ff8be58b311 17096->17098 17100 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17098->17100 17100->17095 17101 7ff8be58b37d 17104 7ff8be583280 __GSHandlerCheck 8 API calls 17101->17104 17102 7ff8be58cff0 terminate 34 API calls 17103 7ff8be58b373 17102->17103 17105 7ff8be587090 _exit 33 API calls 17103->17105 17106 7ff8be58b3a0 17104->17106 17105->17101 17125 7ff8be583d00 RtlEncodePointer 17107->17125 17109 7ff8be590cf6 17110 7ff8be590d23 LoadLibraryW 17109->17110 17111 7ff8be590e15 17109->17111 17112 7ff8be590d44 GetProcAddress 17110->17112 17113 7ff8be590d3d 17110->17113 17114 7ff8be590e39 DecodePointer DecodePointer 17111->17114 17116 7ff8be590e68 17111->17116 17112->17113 17117 7ff8be590d6a 7 API calls 17112->17117 17121 7ff8be583280 __GSHandlerCheck 8 API calls 17113->17121 17114->17116 17115 7ff8be590ec8 17118 7ff8be590f60 DecodePointer 17115->17118 17116->17115 17119 7ff8be590eed DecodePointer 17116->17119 17124 7ff8be590f0d 17116->17124 17117->17111 17120 7ff8be590df3 GetProcAddress EncodePointer 17117->17120 17118->17113 17119->17124 17120->17111 17122 7ff8be58b358 17121->17122 17122->17101 17122->17102 17123 7ff8be590f2f DecodePointer 17123->17115 17123->17118 17124->17118 17124->17123 17125->17109 16445 7ff8be583433 16446 7ff8be583437 16445->16446 16451 7ff8be583446 16445->16451 16453 7ff8be587d00 16446->16453 16455 7ff8be587d0e 16453->16455 16454 7ff8be58343c 16457 7ff8be583e00 16454->16457 16455->16454 16456 7ff8be587d87 DeleteCriticalSection 16455->16456 16456->16455 16458 7ff8be583e0d FlsFree 16457->16458 16459 7ff8be583e23 16457->16459 16458->16459 16463 7ff8be5890b0 16459->16463 16462 7ff8be5888d0 HeapDestroy 16462->16451 16467 7ff8be5890be 16463->16467 16464 7ff8be583441 16464->16462 16465 7ff8be5890fd DeleteCriticalSection 16465->16467 16466 7ff8be58914d 16466->16464 16468 7ff8be589196 DeleteCriticalSection 16466->16468 16467->16465 16467->16466 16468->16466 17126 7ff8be59ff2d 17127 7ff8be59ff37 17126->17127 17128 7ff8be5a0042 17127->17128 17129 7ff8be59ff47 17127->17129 17154 7ff8be589360 LeaveCriticalSection 17128->17154 17130 7ff8be5a003d 17129->17130 17141 7ff8be59ae90 17129->17141 17132 7ff8be5a004c 17134 7ff8be59ff97 17135 7ff8be59ffd0 17134->17135 17137 7ff8be59ffe1 17134->17137 17138 7ff8be59ffbb 17134->17138 17136 7ff8be59af60 _unlock_file2 2 API calls 17135->17136 17136->17130 17137->17135 17140 7ff8be59fd70 _fflush_nolock 25 API calls 17137->17140 17144 7ff8be59fd70 17138->17144 17140->17135 17142 7ff8be59aea4 17141->17142 17143 7ff8be59aec8 EnterCriticalSection 17141->17143 17142->17134 17143->17142 17145 7ff8be59fd81 17144->17145 17146 7ff8be59fd8a 17144->17146 17155 7ff8be59ff00 17145->17155 17170 7ff8be59fdf0 17146->17170 17149 7ff8be59fd94 17150 7ff8be59afb0 _fflush_nolock 17 API calls 17149->17150 17153 7ff8be59fd88 17149->17153 17151 7ff8be59fdba 17150->17151 17174 7ff8be5a07c0 17151->17174 17153->17135 17154->17132 17156 7ff8be59ff22 17155->17156 17157 7ff8be5a0042 17156->17157 17158 7ff8be59ff47 17156->17158 17190 7ff8be589360 LeaveCriticalSection 17157->17190 17159 7ff8be5a003d 17158->17159 17162 7ff8be59ae90 _lock_file2 EnterCriticalSection 17158->17162 17159->17153 17161 7ff8be5a004c 17161->17153 17163 7ff8be59ff97 17162->17163 17164 7ff8be59ffd0 17163->17164 17166 7ff8be59ffe1 17163->17166 17167 7ff8be59ffbb 17163->17167 17165 7ff8be59af60 _unlock_file2 2 API calls 17164->17165 17165->17159 17166->17164 17169 7ff8be59fd70 _fflush_nolock 25 API calls 17166->17169 17168 7ff8be59fd70 _fflush_nolock 25 API calls 17167->17168 17168->17164 17169->17164 17171 7ff8be59fe1f 17170->17171 17173 7ff8be59fe5d 17170->17173 17172 7ff8be59afb0 _fflush_nolock 17 API calls 17171->17172 17171->17173 17172->17173 17173->17149 17175 7ff8be5a07d3 17174->17175 17176 7ff8be5a07e8 17174->17176 17175->17153 17177 7ff8be5a0851 17176->17177 17178 7ff8be5a088f 17176->17178 17179 7ff8be58bd70 _invalid_parameter 17 API calls 17177->17179 17180 7ff8be5a0951 17178->17180 17181 7ff8be5a0913 17178->17181 17179->17175 17182 7ff8be59fae0 _fflush_nolock 3 API calls 17180->17182 17184 7ff8be58bd70 _invalid_parameter 17 API calls 17181->17184 17183 7ff8be5a095a 17182->17183 17185 7ff8be59f900 _fflush_nolock 17 API calls 17183->17185 17189 7ff8be5a09ab __doserrno 17183->17189 17184->17175 17186 7ff8be5a0992 FlushFileBuffers 17185->17186 17187 7ff8be5a099f GetLastError 17186->17187 17186->17189 17187->17189 17191 7ff8be59fbc0 LeaveCriticalSection 17189->17191 17190->17161 17191->17175 18255 7ff8be586c32 18256 7ff8be586c3c 18255->18256 18257 7ff8be586e25 _LocaleUpdate::~_LocaleUpdate 18256->18257 18258 7ff8be586c7a _CrtMemDumpAllObjectsSince 18256->18258 18259 7ff8be583280 __GSHandlerCheck 8 API calls 18257->18259 18261 7ff8be58c260 _CrtMemDumpAllObjectsSince_stat 3 API calls 18258->18261 18262 7ff8be586ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 18258->18262 18260 7ff8be586e89 18259->18260 18261->18262 18263 7ff8be58c0c0 _swprintf_p 17 API calls 18262->18263 18265 7ff8be586dc7 18263->18265 18264 7ff8be586e12 18265->18264 18266 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 18265->18266 18266->18264 16608 7ff8be583d30 16626 7ff8be587540 16608->16626 16613 7ff8be583d4e FlsAlloc 16615 7ff8be583d6a 16613->16615 16616 7ff8be583d73 _calloc_dbg 16613->16616 16614 7ff8be583d42 16617 7ff8be583e00 3 API calls 16614->16617 16619 7ff8be583e00 3 API calls 16615->16619 16620 7ff8be583db9 16616->16620 16621 7ff8be583da4 FlsSetValue 16616->16621 16618 7ff8be583d47 16617->16618 16619->16618 16623 7ff8be583e00 3 API calls 16620->16623 16621->16620 16622 7ff8be583dc2 16621->16622 16635 7ff8be583e30 16622->16635 16623->16618 16641 7ff8be583d00 RtlEncodePointer 16626->16641 16628 7ff8be587549 _initp_misc_winsig 16642 7ff8be58cf20 EncodePointer 16628->16642 16630 7ff8be583d39 16631 7ff8be588fe0 16630->16631 16632 7ff8be588ff6 16631->16632 16633 7ff8be583d3e 16632->16633 16634 7ff8be589022 InitializeCriticalSectionAndSpinCount 16632->16634 16633->16613 16633->16614 16634->16632 16634->16633 16636 7ff8be583ead 16635->16636 16643 7ff8be589360 LeaveCriticalSection 16636->16643 16638 7ff8be583ec7 _updatetlocinfoEx_nolock 16644 7ff8be589360 LeaveCriticalSection 16638->16644 16640 7ff8be583dce GetCurrentThreadId 16640->16618 16641->16628 16642->16630 16643->16638 16644->16640 17192 7ff8be583130 17195 7ff8be583170 17192->17195 17196 7ff8be5831ac 17195->17196 17197 7ff8be583280 __GSHandlerCheck 8 API calls 17196->17197 17198 7ff8be583160 17197->17198 18272 7ff8be5a1200 18273 7ff8be58ed30 _FindAndUnlinkFrame 36 API calls 18272->18273 18274 7ff8be5a1212 _IsExceptionObjectToBeDestroyed __SehTransFilter 18273->18274 17207 7ff8be5858fd 17208 7ff8be585923 _calloc_dbg_impl 17207->17208 17211 7ff8be58c020 17208->17211 17210 7ff8be5859d5 17212 7ff8be58c039 _get_errno_from_oserr 17211->17212 17213 7ff8be58c03b HeapFree 17211->17213 17212->17210 17213->17212 17214 7ff8be58c05a GetLastError 17213->17214 17214->17212 18275 7ff8be596203 18276 7ff8be59616e _CrtMemDumpAllObjectsSince wcsxfrm 18275->18276 18277 7ff8be596238 MultiByteToWideChar 18276->18277 18278 7ff8be5961c8 _LocaleUpdate::~_LocaleUpdate 18276->18278 18277->18278 18279 7ff8be5853fb 18280 7ff8be58541d _realloc_dbg 18279->18280 18281 7ff8be586380 _CrtIsValidHeapPointer HeapValidate 18280->18281 18282 7ff8be585421 18280->18282 18283 7ff8be5854de _calloc_dbg_impl _realloc_dbg 18281->18283 18284 7ff8be58c020 _free_base 2 API calls 18283->18284 18284->18282 18285 7ff8be5a0204 18287 7ff8be5a023d 18285->18287 18286 7ff8be5a028d 18287->18286 18288 7ff8be59ab10 17 API calls 18287->18288 18289 7ff8be5a0326 18287->18289 18288->18289 18289->18286 18290 7ff8be599290 23 API calls 18289->18290 18290->18286 17235 7ff8be59e2fc 17236 7ff8be59e309 get_int64_arg _get_printf_count_output 17235->17236 17237 7ff8be59e38c 17236->17237 17238 7ff8be59e3e1 17236->17238 17240 7ff8be58bd70 _invalid_parameter 17 API calls 17237->17240 17239 7ff8be59eadf 17238->17239 17241 7ff8be59eec0 25 API calls 17238->17241 17249 7ff8be59da75 17238->17249 17242 7ff8be59ef10 25 API calls 17239->17242 17248 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 17240->17248 17241->17239 17243 7ff8be59eafd 17242->17243 17244 7ff8be59eb33 17243->17244 17246 7ff8be59eec0 25 API calls 17243->17246 17245 7ff8be59ec29 17244->17245 17257 7ff8be59eb49 _CrtMemDumpAllObjectsSince 17244->17257 17247 7ff8be59ef10 25 API calls 17245->17247 17246->17244 17250 7ff8be59ebda 17247->17250 17251 7ff8be583280 __GSHandlerCheck 8 API calls 17248->17251 17252 7ff8be59eca1 17249->17252 17255 7ff8be59dbb5 17249->17255 17250->17249 17256 7ff8be59eec0 25 API calls 17250->17256 17253 7ff8be59ed9e 17251->17253 17252->17248 17254 7ff8be58bd70 _invalid_parameter 17 API calls 17252->17254 17254->17248 17258 7ff8be58bd70 _invalid_parameter 17 API calls 17255->17258 17256->17249 17257->17250 17259 7ff8be59f000 wcsxfrm 2 API calls 17257->17259 17260 7ff8be59ee40 25 API calls 17257->17260 17258->17248 17259->17257 17260->17257 18297 7ff8be592c10 18298 7ff8be592c53 18297->18298 18299 7ff8be592c24 _updatetlocinfoEx_nolock 18297->18299 18301 7ff8be589360 LeaveCriticalSection 18299->18301 18301->18298 18302 7ff8be59d410 18307 7ff8be59d3e0 18302->18307 18305 7ff8be59d43c 18314 7ff8be5a0070 18307->18314 18310 7ff8be59d710 18311 7ff8be59d721 18310->18311 18312 7ff8be59d726 18310->18312 18311->18305 18319 7ff8be589360 LeaveCriticalSection 18312->18319 18317 7ff8be5a0083 _free_nolock 18314->18317 18316 7ff8be59d402 18316->18305 18316->18310 18318 7ff8be589360 LeaveCriticalSection 18317->18318 18318->18316 18319->18311 18320 7ff8be58ae14 18321 7ff8be58b390 18320->18321 18322 7ff8be583280 __GSHandlerCheck 8 API calls 18321->18322 18323 7ff8be58b3a0 18322->18323 18324 7ff8be590215 18325 7ff8be590231 18324->18325 18331 7ff8be590302 18324->18331 18395 7ff8be598c80 18325->18395 18328 7ff8be590489 18330 7ff8be592d80 17 API calls 18328->18330 18329 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18333 7ff8be59027e OutputDebugStringW 18329->18333 18334 7ff8be5904a3 18330->18334 18332 7ff8be59040d 18331->18332 18402 7ff8be598c30 18331->18402 18332->18328 18335 7ff8be591640 17 API calls 18332->18335 18336 7ff8be590296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 18333->18336 18337 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18334->18337 18338 7ff8be59045c 18335->18338 18346 7ff8be5902f2 18336->18346 18340 7ff8be5904d0 18337->18340 18342 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18338->18342 18343 7ff8be59053d 18340->18343 18347 7ff8be592d80 17 API calls 18340->18347 18356 7ff8be590583 18340->18356 18342->18328 18348 7ff8be592d80 17 API calls 18343->18348 18344 7ff8be590357 18345 7ff8be5903af 18344->18345 18353 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 18344->18353 18345->18332 18357 7ff8be591640 17 API calls 18345->18357 18352 7ff8be583280 __GSHandlerCheck 8 API calls 18346->18352 18350 7ff8be590510 18347->18350 18349 7ff8be590556 18348->18349 18351 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18349->18351 18354 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18350->18354 18351->18356 18355 7ff8be590cae 18352->18355 18353->18345 18354->18343 18405 7ff8be591590 18356->18405 18359 7ff8be5903e0 18357->18359 18360 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18359->18360 18360->18332 18361 7ff8be5905fa 18362 7ff8be590652 18361->18362 18363 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 18361->18363 18364 7ff8be591640 17 API calls 18362->18364 18367 7ff8be5906b0 18362->18367 18363->18362 18365 7ff8be590683 18364->18365 18366 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18365->18366 18366->18367 18368 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 18367->18368 18369 7ff8be590769 18368->18369 18370 7ff8be58d490 std::exception::_Copy_str 17 API calls 18369->18370 18383 7ff8be5907bd 18369->18383 18371 7ff8be590790 18370->18371 18372 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18371->18372 18372->18383 18373 7ff8be590905 18373->18346 18374 7ff8be590a26 18373->18374 18378 7ff8be5909a4 GetFileType 18373->18378 18375 7ff8be590ba5 18374->18375 18376 7ff8be590b97 OutputDebugStringW 18374->18376 18375->18346 18380 7ff8be590c23 18375->18380 18382 7ff8be598c80 _itow_s 17 API calls 18375->18382 18376->18375 18379 7ff8be5909d0 18378->18379 18385 7ff8be5909ce 18378->18385 18381 7ff8be5909dd WriteConsoleW 18379->18381 18409 7ff8be58b470 18380->18409 18381->18374 18384 7ff8be590a2b GetLastError 18381->18384 18386 7ff8be590bf6 18382->18386 18383->18373 18408 7ff8be589360 LeaveCriticalSection 18383->18408 18384->18374 18384->18385 18387 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 18385->18387 18388 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18386->18388 18390 7ff8be590ab5 18387->18390 18388->18380 18391 7ff8be590b26 WriteFile 18390->18391 18393 7ff8be590ad0 18390->18393 18391->18374 18394 7ff8be590add WriteFile 18393->18394 18394->18374 18396 7ff8be598cd3 18395->18396 18397 7ff8be598ca6 18395->18397 18399 7ff8be598d00 _itow_s 17 API calls 18396->18399 18397->18396 18398 7ff8be598cad 18397->18398 18435 7ff8be598d00 18398->18435 18401 7ff8be590251 18399->18401 18401->18329 18451 7ff8be5986b0 18402->18451 18404 7ff8be598c74 18404->18344 18406 7ff8be5986b0 _wcsftime_l 17 API calls 18405->18406 18407 7ff8be5915de 18406->18407 18407->18361 18408->18373 18410 7ff8be58b48d 18409->18410 18411 7ff8be58b4c4 18410->18411 18412 7ff8be58b4ce GetModuleFileNameW 18410->18412 18415 7ff8be583280 __GSHandlerCheck 8 API calls 18411->18415 18413 7ff8be58b4f2 18412->18413 18419 7ff8be58b538 18412->18419 18414 7ff8be591640 17 API calls 18413->18414 18416 7ff8be58b50b 18414->18416 18417 7ff8be58ba58 18415->18417 18418 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18416->18418 18417->18346 18418->18419 18420 7ff8be590fd0 17 API calls 18419->18420 18423 7ff8be58b5f2 18419->18423 18421 7ff8be58b5c5 18420->18421 18422 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18421->18422 18422->18423 18424 7ff8be591590 _snwprintf_s 17 API calls 18423->18424 18425 7ff8be58b940 18424->18425 18426 7ff8be58b998 18425->18426 18427 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 18425->18427 18428 7ff8be591640 17 API calls 18426->18428 18430 7ff8be58b9f6 18426->18430 18427->18426 18429 7ff8be58b9c9 18428->18429 18431 7ff8be587ff0 _invoke_watson_if_error 16 API calls 18429->18431 18430->18411 18432 7ff8be58cff0 terminate 34 API calls 18430->18432 18431->18430 18433 7ff8be58ba2b 18432->18433 18434 7ff8be587090 _exit 33 API calls 18433->18434 18434->18411 18436 7ff8be598d25 18435->18436 18437 7ff8be598d7b 18436->18437 18438 7ff8be598db9 18436->18438 18439 7ff8be58bd70 _invalid_parameter 17 API calls 18437->18439 18440 7ff8be598e1a 18438->18440 18442 7ff8be598e58 _calloc_dbg_impl 18438->18442 18448 7ff8be598daf 18439->18448 18441 7ff8be58bd70 _invalid_parameter 17 API calls 18440->18441 18441->18448 18443 7ff8be598f9b 18442->18443 18444 7ff8be598f5d 18442->18444 18446 7ff8be59900e 18443->18446 18449 7ff8be59904c 18443->18449 18445 7ff8be58bd70 _invalid_parameter 17 API calls 18444->18445 18445->18448 18447 7ff8be58bd70 _invalid_parameter 17 API calls 18446->18447 18447->18448 18448->18401 18449->18448 18450 7ff8be58bd70 _invalid_parameter 17 API calls 18449->18450 18450->18448 18452 7ff8be5986e6 18451->18452 18453 7ff8be59873c 18452->18453 18455 7ff8be59877a 18452->18455 18454 7ff8be58bd70 _invalid_parameter 17 API calls 18453->18454 18463 7ff8be598770 _calloc_dbg_impl 18454->18463 18456 7ff8be59884c 18455->18456 18457 7ff8be59880e 18455->18457 18455->18463 18458 7ff8be598992 18456->18458 18459 7ff8be598862 18456->18459 18460 7ff8be58bd70 _invalid_parameter 17 API calls 18457->18460 18462 7ff8be598350 _wcsftime_l 17 API calls 18458->18462 18466 7ff8be598350 18459->18466 18460->18463 18464 7ff8be5988b1 _calloc_dbg_impl 18462->18464 18463->18404 18464->18463 18465 7ff8be58bd70 _invalid_parameter 17 API calls 18464->18465 18465->18463 18467 7ff8be59839b 18466->18467 18468 7ff8be5983f1 18467->18468 18470 7ff8be59842f 18467->18470 18469 7ff8be58bd70 _invalid_parameter 17 API calls 18468->18469 18472 7ff8be598425 18469->18472 18471 7ff8be58bd70 _invalid_parameter 17 API calls 18470->18471 18470->18472 18471->18472 18472->18464 17270 7ff8be583909 17272 7ff8be583913 __SehTransFilter 17270->17272 17271 7ff8be5839db __SehTransFilter 17272->17271 17273 7ff8be583a71 RtlUnwindEx 17272->17273 17273->17271 18473 7ff8be583409 18474 7ff8be583e00 3 API calls 18473->18474 18475 7ff8be58340e 18474->18475 18478 7ff8be5888d0 HeapDestroy 18475->18478 18477 7ff8be583413 18478->18477 18479 7ff8be587816 18480 7ff8be587826 _calloc_dbg 18479->18480 18483 7ff8be587a19 GetFileType 18480->18483 18484 7ff8be587a32 InitializeCriticalSectionAndSpinCount 18480->18484 18488 7ff8be587ab9 18480->18488 18481 7ff8be587ce0 SetHandleCount 18482 7ff8be587aaf 18481->18482 18483->18484 18483->18488 18484->18482 18484->18488 18485 7ff8be587b95 GetStdHandle 18486 7ff8be587bb9 18485->18486 18487 7ff8be587c7b 18485->18487 18486->18487 18489 7ff8be587bc8 GetFileType 18486->18489 18487->18481 18488->18481 18488->18485 18488->18487 18489->18487 18490 7ff8be587beb InitializeCriticalSectionAndSpinCount 18489->18490 18490->18482 18490->18487 16441 18000c85c 16442 18000c8c2 16441->16442 16443 1800178a8 CreateProcessW 16442->16443 16444 18000ca47 16443->16444 17274 7ff8be59c30d 17275 7ff8be59c31a get_int64_arg _get_printf_count_output 17274->17275 17276 7ff8be59c39d 17275->17276 17287 7ff8be59c3f2 17275->17287 17277 7ff8be58bd70 _invalid_parameter 17 API calls 17276->17277 17284 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 17277->17284 17278 7ff8be583280 __GSHandlerCheck 8 API calls 17281 7ff8be59cd90 17278->17281 17279 7ff8be59b99c 17280 7ff8be59cc93 17279->17280 17285 7ff8be59bada 17279->17285 17282 7ff8be58bd70 _invalid_parameter 17 API calls 17280->17282 17280->17284 17282->17284 17283 7ff8be59b530 wctomb_s 19 API calls 17283->17287 17284->17278 17286 7ff8be58bd70 _invalid_parameter 17 API calls 17285->17286 17286->17284 17287->17279 17287->17283 16645 7ff8be583110 16648 7ff8be5811e0 16645->16648 16649 7ff8be5811f8 ExitProcess 16648->16649 17315 7ff8be595de0 17316 7ff8be583170 __GSHandlerCheck 8 API calls 17315->17316 17318 7ff8be595e34 17316->17318 17317 7ff8be595e86 17318->17317 17320 7ff8be583870 17318->17320 17321 7ff8be5839db __SehTransFilter 17320->17321 17322 7ff8be5838de __SehTransFilter 17320->17322 17321->17317 17322->17321 17323 7ff8be583a71 RtlUnwindEx 17322->17323 17323->17321 18492 7ff8be5948e0 18493 7ff8be5948f7 std::bad_exception::~bad_exception 18492->18493 18494 7ff8be59490c 18493->18494 18495 7ff8be59d710 _Ref_count LeaveCriticalSection 18493->18495 18495->18494 17327 7ff8be59ade0 17332 7ff8be59fee0 17327->17332 17330 7ff8be59adf9 17333 7ff8be59ff00 _fflush_nolock 25 API calls 17332->17333 17334 7ff8be59ade9 17333->17334 17334->17330 17335 7ff8be59fc70 17334->17335 17341 7ff8be59fc86 17335->17341 17336 7ff8be59fd59 17353 7ff8be589360 LeaveCriticalSection 17336->17353 17338 7ff8be59fd63 17338->17330 17340 7ff8be59fd09 DeleteCriticalSection 17340->17341 17341->17336 17341->17340 17342 7ff8be5a0580 17341->17342 17343 7ff8be5a0599 17342->17343 17344 7ff8be5a062a 17343->17344 17345 7ff8be5a05ef 17343->17345 17349 7ff8be5a0623 17344->17349 17354 7ff8be59ae10 17344->17354 17347 7ff8be58bd70 _invalid_parameter 17 API calls 17345->17347 17347->17349 17348 7ff8be5a0651 17358 7ff8be5a0680 17348->17358 17349->17341 17351 7ff8be5a065c 17369 7ff8be59aee0 17351->17369 17353->17338 17355 7ff8be59ae77 EnterCriticalSection 17354->17355 17356 7ff8be59ae27 17354->17356 17357 7ff8be59ae3b 17355->17357 17356->17355 17356->17357 17357->17348 17359 7ff8be5a0699 17358->17359 17360 7ff8be5a072d 17359->17360 17361 7ff8be5a06ef 17359->17361 17362 7ff8be5a0723 17360->17362 17363 7ff8be59fdf0 _fflush_nolock 17 API calls 17360->17363 17364 7ff8be58bd70 _invalid_parameter 17 API calls 17361->17364 17362->17351 17365 7ff8be5a0752 17363->17365 17364->17362 17366 7ff8be59afb0 _fflush_nolock 17 API calls 17365->17366 17367 7ff8be5a076a 17366->17367 17375 7ff8be5a0a20 17367->17375 17370 7ff8be59af47 LeaveCriticalSection 17369->17370 17371 7ff8be59aef7 17369->17371 17372 7ff8be59af45 17370->17372 17371->17370 17373 7ff8be59af0b 17371->17373 17372->17349 17411 7ff8be589360 LeaveCriticalSection 17373->17411 17376 7ff8be5a0a53 17375->17376 17382 7ff8be5a0a33 __doserrno 17375->17382 17377 7ff8be5a0b05 17376->17377 17378 7ff8be5a0abc __doserrno 17376->17378 17379 7ff8be5a0bd2 17377->17379 17384 7ff8be5a0b89 __doserrno 17377->17384 17380 7ff8be58bd70 _invalid_parameter 17 API calls 17378->17380 17381 7ff8be59fae0 _fflush_nolock 3 API calls 17379->17381 17380->17382 17383 7ff8be5a0bdb 17381->17383 17382->17362 17387 7ff8be5a0c13 17383->17387 17389 7ff8be5a0c80 17383->17389 17386 7ff8be58bd70 _invalid_parameter 17 API calls 17384->17386 17386->17382 17402 7ff8be59fbc0 LeaveCriticalSection 17387->17402 17390 7ff8be59f900 _fflush_nolock 17 API calls 17389->17390 17392 7ff8be5a0c91 17390->17392 17391 7ff8be5a0d05 17403 7ff8be59f7d0 17391->17403 17392->17391 17394 7ff8be5a0ce5 17392->17394 17395 7ff8be59f900 _fflush_nolock 17 API calls 17392->17395 17394->17391 17396 7ff8be59f900 _fflush_nolock 17 API calls 17394->17396 17397 7ff8be5a0cd6 17395->17397 17398 7ff8be5a0cf8 CloseHandle 17396->17398 17399 7ff8be59f900 _fflush_nolock 17 API calls 17397->17399 17398->17391 17400 7ff8be5a0d0f GetLastError 17398->17400 17399->17394 17400->17391 17401 7ff8be5a0d22 _dosmaperr 17401->17387 17402->17382 17404 7ff8be59f7e3 17403->17404 17405 7ff8be59f878 __doserrno 17403->17405 17404->17405 17406 7ff8be59f87a SetStdHandle 17404->17406 17407 7ff8be59f86a 17404->17407 17405->17401 17406->17405 17408 7ff8be59f871 17407->17408 17409 7ff8be59f889 SetStdHandle 17407->17409 17408->17405 17410 7ff8be59f898 SetStdHandle 17408->17410 17409->17405 17410->17405 17411->17372 17421 7ff8be5a13e0 17422 7ff8be59aee0 2 API calls 17421->17422 17423 7ff8be5a13f2 17422->17423 18500 7ff8be5914e1 18501 7ff8be591520 DecodePointer 18500->18501 18502 7ff8be5914ef DecodePointer 18500->18502 18504 7ff8be591540 18501->18504 18502->18501 18503 7ff8be59150f 18502->18503 18503->18501 18505 7ff8be583280 __GSHandlerCheck 8 API calls 18504->18505 18506 7ff8be59157a 18505->18506 18507 7ff8be5912e3 LoadLibraryW 18508 7ff8be591304 GetProcAddress 18507->18508 18516 7ff8be5912fd 18507->18516 18509 7ff8be59132a 7 API calls 18508->18509 18508->18516 18511 7ff8be5913b3 GetProcAddress EncodePointer 18509->18511 18512 7ff8be5913d5 18509->18512 18510 7ff8be583280 __GSHandlerCheck 8 API calls 18513 7ff8be59157a 18510->18513 18511->18512 18514 7ff8be5913f9 DecodePointer DecodePointer 18512->18514 18517 7ff8be591428 DecodePointer 18512->18517 18514->18517 18516->18510 18517->18516 18518 7ff8be5866da 18519 7ff8be586745 18518->18519 18520 7ff8be586725 18518->18520 18522 7ff8be589b10 __updatetmbcinfo LeaveCriticalSection 18519->18522 18523 7ff8be58677f 18519->18523 18520->18519 18524 7ff8be589a70 18520->18524 18522->18523 18525 7ff8be589a79 _updatetlocinfoEx_nolock 18524->18525 18527 7ff8be589ad8 18525->18527 18528 7ff8be589360 LeaveCriticalSection 18525->18528 18527->18519 18528->18527 18529 7ff8be5944e5 18533 7ff8be59445a __SehTransFilter 18529->18533 18530 7ff8be5947d7 18531 7ff8be59485b 18530->18531 18532 7ff8be58cf80 _inconsistency 36 API calls 18530->18532 18532->18531 18534 7ff8be59466c __SehTransFilter 18533->18534 18537 7ff8be595180 __SehTransFilter 38 API calls 18533->18537 18534->18530 18535 7ff8be595bb0 __SehTransFilter 36 API calls 18534->18535 18536 7ff8be594727 18535->18536 18536->18530 18538 7ff8be58e500 __GetUnwindTryBlock 37 API calls 18536->18538 18537->18533 18539 7ff8be594767 18538->18539 18540 7ff8be58edc0 __SehTransFilter 9 API calls 18539->18540 18540->18530 18545 7ff8be585ad9 18546 7ff8be585add 18545->18546 18547 7ff8be586380 _CrtIsValidHeapPointer HeapValidate 18546->18547 18548 7ff8be585b3a 18547->18548 18551 7ff8be589360 LeaveCriticalSection 18548->18551 18550 7ff8be585c14 18551->18550 18552 7ff8be5870e6 18553 7ff8be587090 _exit 33 API calls 18552->18553 18554 7ff8be5870f0 18553->18554 18555 7ff8be587ae3 18558 7ff8be587af3 18555->18558 18556 7ff8be587ce0 SetHandleCount 18564 7ff8be587c74 18556->18564 18557 7ff8be587b95 GetStdHandle 18559 7ff8be587bb9 18557->18559 18561 7ff8be587c7b 18557->18561 18558->18556 18558->18557 18558->18561 18560 7ff8be587bc8 GetFileType 18559->18560 18559->18561 18560->18561 18562 7ff8be587beb InitializeCriticalSectionAndSpinCount 18560->18562 18561->18556 18562->18561 18562->18564 16261 7ff8be5835e1 16262 7ff8be5835f1 16261->16262 16266 7ff8be5835ea 16261->16266 16262->16266 16267 7ff8be5812b0 16262->16267 16265 7ff8be5812b0 14 API calls 16265->16266 16268 7ff8be5812de CoLoadLibrary 16267->16268 16269 7ff8be582f8c 16267->16269 16271 7ff8be582f0f MessageBoxA ExitProcess 16268->16271 16272 7ff8be582f2e VirtualAlloc RtlAllocateHeap 16268->16272 16276 7ff8be583280 16269->16276 16272->16269 16274 7ff8be582f73 _calloc_dbg_impl 16272->16274 16273 7ff8be5830ff 16273->16265 16273->16266 16275 7ff8be582f83 RtlDeleteBoundaryDescriptor 16274->16275 16275->16269 16277 7ff8be583289 16276->16277 16278 7ff8be583294 16277->16278 16279 7ff8be583720 RtlCaptureContext RtlLookupFunctionEntry 16277->16279 16278->16273 16280 7ff8be5837a5 16279->16280 16281 7ff8be583764 RtlVirtualUnwind 16279->16281 16282 7ff8be5837c7 IsDebuggerPresent 16280->16282 16281->16282 16287 7ff8be588d90 16282->16287 16284 7ff8be583826 SetUnhandledExceptionFilter UnhandledExceptionFilter 16285 7ff8be58384e GetCurrentProcess TerminateProcess 16284->16285 16286 7ff8be583844 terminate 16284->16286 16285->16273 16286->16285 16287->16284 17442 7ff8be583fe1 17443 7ff8be583fea SetLastError 17442->17443 16299 7ff8be587de0 16300 7ff8be587ded 16299->16300 16304 7ff8be587df2 std::exception::_Copy_str _calloc_dbg 16299->16304 16306 7ff8be58aa40 16300->16306 16302 7ff8be587e0e 16304->16302 16310 7ff8be58d490 16304->16310 16320 7ff8be587ff0 16304->16320 16307 7ff8be58aa4d 16306->16307 16309 7ff8be58aa57 16306->16309 16324 7ff8be589c10 16307->16324 16309->16304 16311 7ff8be58d4b1 16310->16311 16312 7ff8be58d512 16311->16312 16314 7ff8be58d550 _calloc_dbg_impl 16311->16314 16400 7ff8be58bd70 DecodePointer 16312->16400 16315 7ff8be58d63e 16314->16315 16318 7ff8be58d67c _calloc_dbg_impl 16314->16318 16317 7ff8be58bd70 _invalid_parameter 17 API calls 16315->16317 16316 7ff8be58d546 _calloc_dbg_impl 16316->16304 16317->16316 16318->16316 16319 7ff8be58bd70 _invalid_parameter 17 API calls 16318->16319 16319->16316 16321 7ff8be58800e 16320->16321 16322 7ff8be588010 16320->16322 16321->16304 16323 7ff8be58be00 _invalid_parameter 16 API calls 16322->16323 16323->16321 16325 7ff8be589c2a 16324->16325 16334 7ff8be589b10 16325->16334 16327 7ff8be589c34 16338 7ff8be589f20 16327->16338 16329 7ff8be589c51 16331 7ff8be589ecd 16329->16331 16344 7ff8be58a000 16329->16344 16331->16309 16332 7ff8be589ce8 16332->16331 16357 7ff8be589360 LeaveCriticalSection 16332->16357 16335 7ff8be589b19 16334->16335 16337 7ff8be589bde 16335->16337 16358 7ff8be589360 LeaveCriticalSection 16335->16358 16337->16327 16339 7ff8be589f49 16338->16339 16340 7ff8be589f81 16339->16340 16341 7ff8be589f5b GetOEMCP 16339->16341 16342 7ff8be589f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 16340->16342 16343 7ff8be589f88 GetACP 16340->16343 16341->16342 16342->16329 16343->16342 16345 7ff8be589f20 __initmbctable 2 API calls 16344->16345 16347 7ff8be58a028 16345->16347 16346 7ff8be58a234 16350 7ff8be58a25d IsValidCodePage 16346->16350 16352 7ff8be58a039 __initmbctable 16346->16352 16347->16346 16347->16352 16353 7ff8be58a08e __initmbctable 16347->16353 16348 7ff8be583280 __GSHandlerCheck 8 API calls 16349 7ff8be58a470 16348->16349 16349->16332 16351 7ff8be58a27b GetCPInfo 16350->16351 16350->16352 16351->16352 16355 7ff8be58a295 __initmbctable 16351->16355 16352->16348 16354 7ff8be58a5e0 __initmbctable 19 API calls 16353->16354 16354->16352 16359 7ff8be58a5e0 GetCPInfo 16355->16359 16357->16331 16358->16337 16360 7ff8be58a61f 16359->16360 16368 7ff8be58a7dc 16359->16368 16370 7ff8be58f4d0 16360->16370 16361 7ff8be583280 __GSHandlerCheck 8 API calls 16362 7ff8be58aa30 16361->16362 16362->16352 16364 7ff8be58a734 16374 7ff8be58ef00 16364->16374 16366 7ff8be58a788 16367 7ff8be58ef00 __initmbctable 7 API calls 16366->16367 16367->16368 16368->16361 16369 7ff8be58a80a 16368->16369 16369->16352 16371 7ff8be58f4f9 _CrtMemDumpAllObjectsSince 16370->16371 16378 7ff8be58f570 16371->16378 16373 7ff8be58f550 _LocaleUpdate::~_LocaleUpdate 16373->16364 16375 7ff8be58ef2c _CrtMemDumpAllObjectsSince 16374->16375 16385 7ff8be58efb0 16375->16385 16377 7ff8be58ef8e _LocaleUpdate::~_LocaleUpdate 16377->16366 16379 7ff8be58f599 MultiByteToWideChar 16378->16379 16381 7ff8be58f60b malloc _calloc_dbg_impl _MarkAllocaS 16379->16381 16383 7ff8be58f604 _CrtMemDumpAllObjectsSince_stat 16379->16383 16382 7ff8be58f68b MultiByteToWideChar 16381->16382 16381->16383 16382->16383 16384 7ff8be58f6ca GetStringTypeW 16382->16384 16383->16373 16384->16383 16386 7ff8be58efd4 __initmbctable 16385->16386 16387 7ff8be58f068 MultiByteToWideChar 16386->16387 16389 7ff8be58f0a5 _CrtMemDumpAllObjectsSince_stat 16387->16389 16392 7ff8be58f0ac malloc _MarkAllocaS 16387->16392 16388 7ff8be58f122 MultiByteToWideChar 16388->16389 16390 7ff8be58f164 LCMapStringW 16388->16390 16389->16377 16390->16389 16391 7ff8be58f1a8 16390->16391 16393 7ff8be58f1b8 16391->16393 16399 7ff8be58f222 malloc _MarkAllocaS 16391->16399 16392->16388 16392->16389 16393->16389 16394 7ff8be58f1d9 LCMapStringW 16393->16394 16394->16389 16395 7ff8be58f2ac LCMapStringW 16395->16389 16396 7ff8be58f2ea 16395->16396 16397 7ff8be58f341 WideCharToMultiByte 16396->16397 16398 7ff8be58f2f4 WideCharToMultiByte 16396->16398 16397->16389 16398->16389 16399->16389 16399->16395 16401 7ff8be58bdd0 16400->16401 16402 7ff8be58bdac 16400->16402 16404 7ff8be58be00 16401->16404 16402->16316 16407 7ff8be58be50 16404->16407 16408 7ff8be58be81 terminate 16407->16408 16409 7ff8be58be8d RtlCaptureContext RtlLookupFunctionEntry 16407->16409 16408->16409 16410 7ff8be58bf64 16409->16410 16411 7ff8be58bf1c RtlVirtualUnwind 16409->16411 16412 7ff8be58bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16410->16412 16411->16412 16413 7ff8be58bfde terminate 16412->16413 16414 7ff8be583280 __GSHandlerCheck 8 API calls 16413->16414 16415 7ff8be58be2d GetCurrentProcess TerminateProcess 16414->16415 16415->16402 17444 7ff8be59bfde 17454 7ff8be59c00c 17444->17454 17445 7ff8be59b99c 17446 7ff8be59cc93 17445->17446 17450 7ff8be59bada 17445->17450 17447 7ff8be58bd70 _invalid_parameter 17 API calls 17446->17447 17449 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 17446->17449 17447->17449 17448 7ff8be59b530 wctomb_s 19 API calls 17448->17454 17451 7ff8be583280 __GSHandlerCheck 8 API calls 17449->17451 17453 7ff8be58bd70 _invalid_parameter 17 API calls 17450->17453 17452 7ff8be59cd90 17451->17452 17453->17449 17454->17445 17454->17448 17455 7ff8be58f7f1 17456 7ff8be58f80d 17455->17456 17476 7ff8be58f8de _wcsftime_l 17455->17476 17512 7ff8be596fb0 17456->17512 17458 7ff8be58fa70 17519 7ff8be5969c0 17458->17519 17460 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17463 7ff8be58f85a OutputDebugStringA 17460->17463 17462 7ff8be58f9f4 17462->17458 17465 7ff8be58d490 std::exception::_Copy_str 17 API calls 17462->17465 17466 7ff8be58f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 17463->17466 17464 7ff8be58fa8a 17467 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17464->17467 17468 7ff8be58fa43 17465->17468 17472 7ff8be58f8ce 17466->17472 17470 7ff8be58fab7 17467->17470 17471 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17468->17471 17473 7ff8be58fb24 17470->17473 17474 7ff8be5969c0 17 API calls 17470->17474 17488 7ff8be58fb6a 17470->17488 17471->17458 17481 7ff8be583280 __GSHandlerCheck 8 API calls 17472->17481 17475 7ff8be5969c0 17 API calls 17473->17475 17477 7ff8be58faf7 17474->17477 17478 7ff8be58fb3d 17475->17478 17476->17462 17482 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 17476->17482 17483 7ff8be58f996 17476->17483 17479 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17477->17479 17480 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17478->17480 17479->17473 17480->17488 17485 7ff8be59011d 17481->17485 17482->17483 17483->17462 17484 7ff8be58d490 std::exception::_Copy_str 17 API calls 17483->17484 17486 7ff8be58f9c7 17484->17486 17487 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17486->17487 17487->17462 17489 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 17488->17489 17490 7ff8be58fc39 17488->17490 17489->17490 17491 7ff8be58fc97 17490->17491 17492 7ff8be58d490 std::exception::_Copy_str 17 API calls 17490->17492 17532 7ff8be596970 17491->17532 17493 7ff8be58fc6a 17492->17493 17495 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17493->17495 17495->17491 17497 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 17498 7ff8be58fd6e 17497->17498 17499 7ff8be591640 17 API calls 17498->17499 17509 7ff8be58fdbb 17498->17509 17500 7ff8be58fd8e 17499->17500 17501 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17500->17501 17501->17509 17502 7ff8be58ffef 17503 7ff8be590016 17502->17503 17504 7ff8be590008 OutputDebugStringA 17502->17504 17503->17472 17508 7ff8be596fb0 _itow_s 17 API calls 17503->17508 17504->17503 17506 7ff8be58ff03 std::exception::_Copy_str 17506->17472 17506->17502 17507 7ff8be58ffaa WriteFile 17506->17507 17507->17502 17510 7ff8be590065 17508->17510 17509->17506 17535 7ff8be589360 LeaveCriticalSection 17509->17535 17511 7ff8be587ff0 _invoke_watson_if_error 16 API calls 17510->17511 17511->17472 17513 7ff8be597003 17512->17513 17514 7ff8be596fd6 17512->17514 17516 7ff8be597030 _itow_s 17 API calls 17513->17516 17514->17513 17515 7ff8be596fdd 17514->17515 17536 7ff8be597030 17515->17536 17518 7ff8be58f82d 17516->17518 17518->17460 17520 7ff8be5969e1 17519->17520 17521 7ff8be596a42 17520->17521 17523 7ff8be596a80 _calloc_dbg_impl 17520->17523 17522 7ff8be58bd70 _invalid_parameter 17 API calls 17521->17522 17526 7ff8be596a76 _calloc_dbg_impl 17522->17526 17524 7ff8be596b6e 17523->17524 17525 7ff8be596bac _calloc_dbg_impl 17523->17525 17527 7ff8be58bd70 _invalid_parameter 17 API calls 17524->17527 17528 7ff8be596ce8 17525->17528 17529 7ff8be596d26 _calloc_dbg_impl 17525->17529 17526->17464 17527->17526 17530 7ff8be58bd70 _invalid_parameter 17 API calls 17528->17530 17529->17526 17531 7ff8be58bd70 _invalid_parameter 17 API calls 17529->17531 17530->17526 17531->17526 17552 7ff8be5963e0 17532->17552 17534 7ff8be58fd20 17534->17497 17535->17506 17537 7ff8be597055 17536->17537 17538 7ff8be5970ab 17537->17538 17540 7ff8be5970e9 17537->17540 17539 7ff8be58bd70 _invalid_parameter 17 API calls 17538->17539 17549 7ff8be5970df 17539->17549 17541 7ff8be59714a 17540->17541 17543 7ff8be597188 _calloc_dbg_impl 17540->17543 17542 7ff8be58bd70 _invalid_parameter 17 API calls 17541->17542 17542->17549 17544 7ff8be597287 17543->17544 17545 7ff8be5972c5 17543->17545 17546 7ff8be58bd70 _invalid_parameter 17 API calls 17544->17546 17547 7ff8be597338 17545->17547 17550 7ff8be597376 17545->17550 17546->17549 17548 7ff8be58bd70 _invalid_parameter 17 API calls 17547->17548 17548->17549 17549->17518 17550->17549 17551 7ff8be58bd70 _invalid_parameter 17 API calls 17550->17551 17551->17549 17553 7ff8be59640e 17552->17553 17554 7ff8be59648e 17553->17554 17558 7ff8be5964cc _calloc_dbg_impl 17553->17558 17555 7ff8be58bd70 _invalid_parameter 17 API calls 17554->17555 17563 7ff8be5964c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 17555->17563 17556 7ff8be59668e _CrtMemDumpAllObjectsSince 17564 7ff8be595ea0 17556->17564 17557 7ff8be59663f 17559 7ff8be58bd70 _invalid_parameter 17 API calls 17557->17559 17558->17556 17558->17557 17559->17563 17561 7ff8be5966b5 _calloc_dbg_impl 17562 7ff8be58bd70 _invalid_parameter 17 API calls 17561->17562 17561->17563 17562->17563 17563->17534 17565 7ff8be595ecf 17564->17565 17566 7ff8be595fae 17565->17566 17567 7ff8be595f6e 17565->17567 17574 7ff8be595eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 17565->17574 17569 7ff8be5962e1 _CrtMemDumpAllObjectsSince 17566->17569 17570 7ff8be595fcf _CrtMemDumpAllObjectsSince 17566->17570 17568 7ff8be58bd70 _invalid_parameter 17 API calls 17567->17568 17568->17574 17571 7ff8be59632f MultiByteToWideChar 17569->17571 17569->17574 17572 7ff8be5960a1 MultiByteToWideChar 17570->17572 17570->17574 17571->17574 17573 7ff8be59610e GetLastError 17572->17573 17572->17574 17573->17574 17576 7ff8be596154 _CrtMemDumpAllObjectsSince wcsxfrm 17573->17576 17574->17561 17575 7ff8be596238 MultiByteToWideChar 17575->17574 17576->17574 17576->17575 17581 7ff8be58a7e9 17582 7ff8be58a7f9 17581->17582 17583 7ff8be58a80a 17582->17583 17584 7ff8be583280 __GSHandlerCheck 8 API calls 17582->17584 17585 7ff8be58aa30 17584->17585 17586 7ff8be58c7e9 17587 7ff8be58c90c EncodePointer EncodePointer 17586->17587 17589 7ff8be58c80d 17586->17589 17588 7ff8be58c8ca 17587->17588 17590 7ff8be58c872 17589->17590 17595 7ff8be584a00 17589->17595 17590->17588 17592 7ff8be584a00 _realloc_dbg 30 API calls 17590->17592 17593 7ff8be58c8ce EncodePointer 17590->17593 17594 7ff8be58c8bd 17592->17594 17593->17587 17594->17588 17594->17593 17596 7ff8be584a22 17595->17596 17601 7ff8be584a70 17596->17601 17598 7ff8be584a4c 17612 7ff8be589360 LeaveCriticalSection 17598->17612 17600 7ff8be584a5b 17600->17590 17603 7ff8be584ad4 _realloc_dbg 17601->17603 17611 7ff8be584aae _calloc_dbg_impl 17601->17611 17603->17611 17613 7ff8be586380 17603->17613 17604 7ff8be584e2c 17605 7ff8be584f64 17604->17605 17606 7ff8be584f90 17604->17606 17604->17611 17617 7ff8be58bc30 17605->17617 17632 7ff8be58ba60 17606->17632 17609 7ff8be584fa6 17610 7ff8be584fba HeapSize 17609->17610 17609->17611 17610->17611 17611->17598 17612->17600 17614 7ff8be586395 _CrtIsValidPointer 17613->17614 17615 7ff8be586391 17613->17615 17614->17615 17616 7ff8be5863b6 HeapValidate 17614->17616 17615->17604 17616->17615 17618 7ff8be58bc50 17617->17618 17619 7ff8be58bc5f 17617->17619 17643 7ff8be58abf0 17618->17643 17620 7ff8be58bc67 17619->17620 17626 7ff8be58bc78 17619->17626 17622 7ff8be58c020 _free_base 2 API calls 17620->17622 17629 7ff8be58bc5a _get_errno_from_oserr 17622->17629 17623 7ff8be58bcba 17625 7ff8be58abb0 _callnewh DecodePointer 17623->17625 17624 7ff8be58bc9a HeapReAlloc 17624->17626 17625->17629 17626->17623 17626->17624 17627 7ff8be58bce4 17626->17627 17630 7ff8be58abb0 _callnewh DecodePointer 17626->17630 17631 7ff8be58bd1f GetLastError 17626->17631 17628 7ff8be58bcee GetLastError 17627->17628 17627->17629 17628->17629 17629->17611 17630->17626 17631->17629 17635 7ff8be58ba76 17632->17635 17633 7ff8be58bb07 17636 7ff8be58bb32 HeapSize HeapReAlloc 17633->17636 17640 7ff8be58bb00 _get_errno_from_oserr 17633->17640 17634 7ff8be58bacc 17637 7ff8be58bd70 _invalid_parameter 17 API calls 17634->17637 17635->17633 17635->17634 17638 7ff8be58bb74 17636->17638 17636->17640 17637->17640 17639 7ff8be58bba0 GetLastError 17638->17639 17649 7ff8be58bbd0 HeapQueryInformation 17638->17649 17639->17640 17640->17609 17644 7ff8be58ac4d 17643->17644 17648 7ff8be58ac0a 17643->17648 17645 7ff8be58abb0 _callnewh DecodePointer 17644->17645 17647 7ff8be58ac21 17645->17647 17646 7ff8be58abb0 _callnewh DecodePointer 17646->17648 17647->17629 17648->17646 17648->17647 17650 7ff8be58bb90 17649->17650 17650->17639 17650->17640 17651 7ff8be5975e9 17652 7ff8be5975f4 17651->17652 17655 7ff8be5975fb 17651->17655 17653 7ff8be583280 __GSHandlerCheck 8 API calls 17652->17653 17654 7ff8be597d85 17653->17654 17656 7ff8be58bd70 _invalid_parameter 17 API calls 17655->17656 17656->17652 17657 7ff8be5891ea 17658 7ff8be5891ef 17657->17658 17659 7ff8be5874e0 __crtExitProcess 3 API calls 17658->17659 17660 7ff8be589203 17659->17660 18606 7ff8be58d0ea 18607 7ff8be58d0ef 18606->18607 18608 7ff8be587090 _exit 33 API calls 18607->18608 18609 7ff8be58d209 18607->18609 18612 7ff8be58d0fc 18607->18612 18608->18609 18611 7ff8be58d289 18609->18611 18614 7ff8be583d00 RtlEncodePointer 18609->18614 18611->18612 18615 7ff8be589360 LeaveCriticalSection 18611->18615 18614->18611 18615->18612 18639 7ff8be599aeb 18640 7ff8be599b18 18639->18640 18641 7ff8be599b2c 18639->18641 18642 7ff8be599520 19 API calls 18640->18642 18643 7ff8be59ab10 17 API calls 18641->18643 18642->18641 18649 7ff8be599b38 18643->18649 18644 7ff8be599c04 18645 7ff8be59a1cb 18644->18645 18646 7ff8be599c23 GetConsoleCP 18644->18646 18647 7ff8be59a205 18645->18647 18648 7ff8be59a8ad WriteFile 18645->18648 18654 7ff8be599c4d 18646->18654 18650 7ff8be59a400 18647->18650 18655 7ff8be59a21a 18647->18655 18651 7ff8be59a923 GetLastError 18648->18651 18656 7ff8be599dd9 _dosmaperr __doserrno 18648->18656 18649->18644 18653 7ff8be599bae GetConsoleMode 18649->18653 18652 7ff8be59a40e 18650->18652 18670 7ff8be59a5f3 18650->18670 18651->18656 18652->18656 18661 7ff8be59a531 WriteFile 18652->18661 18653->18644 18654->18656 18663 7ff8be599f66 WideCharToMultiByte 18654->18663 18669 7ff8be59fc00 WriteConsoleW CreateFileW _putwch_nolock 18654->18669 18672 7ff8be59a158 GetLastError 18654->18672 18673 7ff8be59a06d WriteFile 18654->18673 18674 7ff8be59f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 18654->18674 18676 7ff8be59a1b5 GetLastError 18654->18676 18655->18656 18657 7ff8be59a33e WriteFile 18655->18657 18658 7ff8be583280 __GSHandlerCheck 8 API calls 18656->18658 18657->18655 18659 7ff8be59a3ea GetLastError 18657->18659 18660 7ff8be59a9f5 18658->18660 18659->18656 18661->18652 18666 7ff8be59a5dd GetLastError 18661->18666 18662 7ff8be59a726 WideCharToMultiByte 18665 7ff8be59a791 GetLastError 18662->18665 18662->18670 18663->18656 18664 7ff8be599fbf WriteFile 18663->18664 18664->18654 18667 7ff8be59a050 GetLastError 18664->18667 18665->18656 18666->18656 18667->18654 18667->18656 18668 7ff8be59a7b0 WriteFile 18668->18670 18671 7ff8be59a857 GetLastError 18668->18671 18669->18654 18670->18656 18670->18662 18670->18668 18671->18670 18672->18656 18673->18654 18675 7ff8be59a103 GetLastError 18673->18675 18674->18654 18675->18656 18676->18656 16469 7ff8be586ff2 16470 7ff8be586ffe 16469->16470 16473 7ff8be58ca00 16470->16473 16472 7ff8be587011 _initterm_e 16474 7ff8be58ca0e 16473->16474 16475 7ff8be58ca23 EncodePointer 16474->16475 16476 7ff8be58ca4b 16474->16476 16475->16474 16476->16472 18688 7ff8be5976c0 18690 7ff8be5976cf _CrtMemDumpAllObjectsSince 18688->18690 18691 7ff8be597be3 _CrtMemDumpAllObjectsSince 18688->18691 18689 7ff8be5976e6 _LocaleUpdate::~_LocaleUpdate 18695 7ff8be583280 __GSHandlerCheck 8 API calls 18689->18695 18690->18689 18693 7ff8be597905 _CrtMemDumpAllObjectsSince 18690->18693 18694 7ff8be5977f5 _CrtMemDumpAllObjectsSince wcsncnt 18690->18694 18691->18689 18692 7ff8be597cc6 WideCharToMultiByte 18691->18692 18692->18689 18696 7ff8be59790f WideCharToMultiByte 18693->18696 18699 7ff8be597827 WideCharToMultiByte 18694->18699 18697 7ff8be597d85 18695->18697 18698 7ff8be597965 18696->18698 18698->18689 18700 7ff8be59799a GetLastError 18698->18700 18699->18689 18700->18689 18702 7ff8be5979d3 _CrtMemDumpAllObjectsSince 18700->18702 18701 7ff8be597a05 WideCharToMultiByte 18701->18689 18701->18702 18702->18689 18702->18701 17669 7ff8be599fba 17672 7ff8be599c4d 17669->17672 17670 7ff8be59a06d WriteFile 17671 7ff8be59a103 GetLastError 17670->17671 17670->17672 17673 7ff8be599dd9 _dosmaperr __doserrno 17671->17673 17672->17670 17672->17673 17676 7ff8be599f66 WideCharToMultiByte 17672->17676 17679 7ff8be59a158 GetLastError 17672->17679 17680 7ff8be59f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 17672->17680 17681 7ff8be59fc00 WriteConsoleW CreateFileW _putwch_nolock 17672->17681 17682 7ff8be59a1b5 GetLastError 17672->17682 17674 7ff8be583280 __GSHandlerCheck 8 API calls 17673->17674 17675 7ff8be59a9f5 17674->17675 17676->17673 17677 7ff8be599fbf WriteFile 17676->17677 17677->17672 17678 7ff8be59a050 GetLastError 17677->17678 17678->17672 17678->17673 17679->17673 17680->17672 17681->17672 17682->17673 18730 7ff8be5868c4 18731 7ff8be5868d1 18730->18731 18732 7ff8be586ba6 18731->18732 18735 7ff8be5868ed _CrtIsValidPointer 18731->18735 18748 7ff8be589360 LeaveCriticalSection 18732->18748 18734 7ff8be586bb0 18736 7ff8be58695e IsBadReadPtr 18735->18736 18737 7ff8be586976 18735->18737 18747 7ff8be58692f 18735->18747 18736->18737 18738 7ff8be586a29 18737->18738 18739 7ff8be586ad2 18737->18739 18742 7ff8be586abe 18738->18742 18743 7ff8be586a86 IsBadReadPtr 18738->18743 18740 7ff8be586b2d 18739->18740 18741 7ff8be586add 18739->18741 18746 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18740->18746 18740->18747 18745 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18741->18745 18744 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 18742->18744 18743->18742 18743->18747 18744->18747 18745->18747 18746->18747 18748->18734 18749 7ff8be59bcbd 18750 7ff8be59b99c 18749->18750 18751 7ff8be59cc93 18750->18751 18754 7ff8be59bada 18750->18754 18752 7ff8be58bd70 _invalid_parameter 17 API calls 18751->18752 18753 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 18751->18753 18752->18753 18755 7ff8be583280 __GSHandlerCheck 8 API calls 18753->18755 18757 7ff8be58bd70 _invalid_parameter 17 API calls 18754->18757 18756 7ff8be59cd90 18755->18756 18757->18753 17687 7ff8be5833d6 17690 7ff8be5888d0 HeapDestroy 17687->17690 17689 7ff8be5833db 17690->17689 18769 7ff8be5834d5 18770 7ff8be5834da _calloc_dbg 18769->18770 18771 7ff8be58350b FlsSetValue 18770->18771 18775 7ff8be583548 18770->18775 18772 7ff8be583520 18771->18772 18771->18775 18773 7ff8be583e30 LeaveCriticalSection 18772->18773 18774 7ff8be58352c GetCurrentThreadId 18773->18774 18774->18775 17695 7ff8be59a7a0 17701 7ff8be59a61f 17695->17701 17696 7ff8be59a726 WideCharToMultiByte 17697 7ff8be59a791 GetLastError 17696->17697 17696->17701 17703 7ff8be59a887 _dosmaperr __doserrno 17697->17703 17698 7ff8be59a7b0 WriteFile 17700 7ff8be59a857 GetLastError 17698->17700 17698->17701 17699 7ff8be583280 __GSHandlerCheck 8 API calls 17702 7ff8be59a9f5 17699->17702 17700->17701 17701->17696 17701->17698 17701->17703 17703->17699 16210 7ff8be584399 16212 7ff8be5843a6 16210->16212 16213 7ff8be584377 16210->16213 16213->16210 16213->16212 16214 7ff8be58abb0 DecodePointer 16213->16214 16215 7ff8be58abd3 16214->16215 16215->16213 16216 7ff8be583599 16219 7ff8be588900 16216->16219 16218 7ff8be58359e 16220 7ff8be588920 16219->16220 16221 7ff8be588936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 16219->16221 16220->16218 16222 7ff8be5889de 16221->16222 16222->16220 16288 ce0000 16289 ce0183 16288->16289 16290 ce043e VirtualAlloc 16289->16290 16293 ce0462 16290->16293 16291 ce0531 GetNativeSystemInfo 16292 ce056d VirtualAlloc 16291->16292 16294 ce0a7b 16291->16294 16298 ce058b 16292->16298 16293->16291 16293->16294 16295 ce0a00 16295->16294 16296 ce0a56 RtlAddFunctionTable 16295->16296 16296->16294 16297 ce09d9 VirtualProtect 16297->16298 16298->16295 16298->16297 16298->16298 18808 7ff8be59809f 18809 7ff8be5980b0 _calloc_dbg_impl 18808->18809 18810 7ff8be598145 _calloc_dbg_impl 18808->18810 18810->18809 18811 7ff8be58bd70 _invalid_parameter 17 API calls 18810->18811 18811->18809 18812 7ff8be592c9f 18813 7ff8be592caf 18812->18813 18814 7ff8be592ca6 18812->18814 18814->18813 18815 7ff8be58bd70 _invalid_parameter 17 API calls 18814->18815 18815->18813 18816 7ff8be585cad 18819 7ff8be585cb8 18816->18819 18818 7ff8be586201 18820 7ff8be585e1a _realloc_dbg 18819->18820 18821 7ff8be589360 LeaveCriticalSection 18819->18821 18821->18818 17731 7ff8be583faa 17732 7ff8be583e30 LeaveCriticalSection 17731->17732 17733 7ff8be583fb6 GetCurrentThreadId 17732->17733 17734 7ff8be583fea SetLastError 17733->17734 16430 7ff8be58aca8 16431 7ff8be58acb2 16430->16431 16435 7ff8be5874e0 16431->16435 16433 7ff8be58acbc RtlAllocateHeap 16438 7ff8be587490 GetModuleHandleW 16435->16438 16439 7ff8be5874d1 ExitProcess 16438->16439 16440 7ff8be5874b2 GetProcAddress 16438->16440 16440->16439 18835 7ff8be5810b0 18837 7ff8be5810da 18835->18837 18836 7ff8be5810fc 18839 7ff8be583280 __GSHandlerCheck 8 API calls 18836->18839 18837->18836 18838 7ff8be581000 4 API calls 18837->18838 18838->18836 18840 7ff8be58112c 18839->18840 18841 7ff8be58c080 HeapValidate 18842 7ff8be58c0a2 18841->18842 17735 7ff8be59b580 17736 7ff8be59b5fa 17735->17736 17737 7ff8be59b676 17736->17737 17738 7ff8be59b6cb 17736->17738 17740 7ff8be58bd70 _invalid_parameter 17 API calls 17737->17740 17739 7ff8be59afb0 _fflush_nolock 17 API calls 17738->17739 17741 7ff8be59b6fe 17738->17741 17739->17741 17747 7ff8be59b6aa _LocaleUpdate::~_LocaleUpdate 17740->17747 17742 7ff8be59b84d 17741->17742 17743 7ff8be59b8a2 17741->17743 17744 7ff8be58bd70 _invalid_parameter 17 API calls 17742->17744 17745 7ff8be59b915 17743->17745 17751 7ff8be59b96a 17743->17751 17744->17747 17750 7ff8be58bd70 _invalid_parameter 17 API calls 17745->17750 17746 7ff8be583280 __GSHandlerCheck 8 API calls 17748 7ff8be59cd90 17746->17748 17747->17746 17749 7ff8be59cc93 17749->17747 17752 7ff8be58bd70 _invalid_parameter 17 API calls 17749->17752 17750->17747 17751->17749 17753 7ff8be59bada 17751->17753 17752->17747 17754 7ff8be58bd70 _invalid_parameter 17 API calls 17753->17754 17754->17747 17777 7ff8be58c990 17781 7ff8be584980 17777->17781 17779 7ff8be58c9b8 EncodePointer 17780 7ff8be58c9e5 17779->17780 17782 7ff8be5849cb _calloc_dbg_impl 17781->17782 17782->17779 17783 7ff8be595393 17784 7ff8be5953a0 17783->17784 17785 7ff8be5953b4 __SehTransFilter 17784->17785 17786 7ff8be5953cc 17784->17786 17792 7ff8be5954a0 RaiseException 17785->17792 17793 7ff8be5954a0 RaiseException 17786->17793 17788 7ff8be5953ca 17794 7ff8be58ed30 17788->17794 17791 7ff8be5953e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 17792->17788 17793->17788 17795 7ff8be58ed3e 17794->17795 17797 7ff8be58ed4c 17795->17797 17800 7ff8be58cf80 DecodePointer 17795->17800 17798 7ff8be58cf80 _inconsistency 36 API calls 17797->17798 17799 7ff8be58ed88 17797->17799 17798->17799 17799->17791 17801 7ff8be58cf9e 17800->17801 17802 7ff8be58cf50 terminate 35 API calls 17801->17802 17803 7ff8be58cfa9 17802->17803 17803->17797 18843 7ff8be592695 18844 7ff8be5926a0 18843->18844 18845 7ff8be58bd70 _invalid_parameter 17 API calls 18844->18845 18846 7ff8be5926ab 18844->18846 18845->18846 18851 7ff8be594a95 18853 7ff8be594aad __SehTransFilter 18851->18853 18852 7ff8be594c2b 18853->18852 18854 7ff8be595180 __SehTransFilter 38 API calls 18853->18854 18854->18852 17822 7ff8be59df8d 17824 7ff8be59dfbb 17822->17824 17823 7ff8be59eadf 17826 7ff8be59ef10 25 API calls 17823->17826 17824->17823 17825 7ff8be59eec0 25 API calls 17824->17825 17835 7ff8be59da75 17824->17835 17825->17823 17827 7ff8be59eafd 17826->17827 17828 7ff8be59eb33 17827->17828 17830 7ff8be59eec0 25 API calls 17827->17830 17829 7ff8be59ec29 17828->17829 17843 7ff8be59eb49 _CrtMemDumpAllObjectsSince 17828->17843 17831 7ff8be59ef10 25 API calls 17829->17831 17830->17828 17832 7ff8be59ebda 17831->17832 17832->17835 17837 7ff8be59eec0 25 API calls 17832->17837 17833 7ff8be59eca1 17834 7ff8be58bd70 _invalid_parameter 17 API calls 17833->17834 17839 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 17833->17839 17834->17839 17835->17833 17836 7ff8be59dbb5 17835->17836 17841 7ff8be58bd70 _invalid_parameter 17 API calls 17836->17841 17837->17835 17838 7ff8be583280 __GSHandlerCheck 8 API calls 17840 7ff8be59ed9e 17838->17840 17839->17838 17841->17839 17842 7ff8be59f000 wcsxfrm 2 API calls 17842->17843 17843->17832 17843->17842 17844 7ff8be59ee40 25 API calls 17843->17844 17844->17843

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: AllocAllocateBoundaryDeleteDescriptorExitHeapLibraryLoadMessageProcessVirtual
                                                                      • String ID: :Pt$aZ.$!k}$"<t$"BQa$#sa{$$cb($$v"P$)*E$*p$+80Z$+sui$,'a$,kb($-~5$1+t$1>#J$1D4v$3/Q$4cg$9cnt$:-ZZ$?#$@kb($A+M$CwT>$GBQ+$N tW$N7#6$Pv5=$QS}5$Qp_*$Qv5$Qv}N$VqQS$[`$]=5[$^ir$_>zT$_>zT$a%"^$aQTH$b('x$b(/N$bkg2$c(kA$eMh$g(%"$gWQ>tTQv5MVM6qQS<jb(kAk%aQTGeMhH)59cj$hH)}$iAk%$kj$k%$b$k%a^$kW]>$o(fA$oRP$pNR`$pw ~$p0$q.$$t+)s$t/p$uTQ2$u'($werfault.exe$xT]v$}LhH$L`$@+*$L1&$S<j$aEy$w5M$|Oi$hH
                                                                      • API String ID: 3056597726-2091011546
                                                                      • Opcode ID: 1c06ffdaf7f78c717c8658d928c07ebd4f6ae3fbc6f84201f2b376329c5d69d0
                                                                      • Instruction ID: d9ae9267f12961625a671ec6485910d1964e9930f6df37120ea66c171ed46aca
                                                                      • Opcode Fuzzy Hash: 1c06ffdaf7f78c717c8658d928c07ebd4f6ae3fbc6f84201f2b376329c5d69d0
                                                                      • Instruction Fuzzy Hash: F8E2B6B650A7C18EE374CF26AE947CD3AA1F341748F609208C3992FA1DCB795255CF86
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 15 ce0000-ce0460 call ce0aa8 * 2 VirtualAlloc 37 ce048a-ce0494 15->37 38 ce0462-ce0466 15->38 41 ce049a-ce049e 37->41 42 ce0a91-ce0aa6 37->42 39 ce0468-ce0488 38->39 39->37 39->39 41->42 43 ce04a4-ce04a8 41->43 43->42 44 ce04ae-ce04b2 43->44 44->42 45 ce04b8-ce04bf 44->45 45->42 46 ce04c5-ce04d2 45->46 46->42 47 ce04d8-ce04e1 46->47 47->42 48 ce04e7-ce04f4 47->48 48->42 49 ce04fa-ce0507 48->49 50 ce0509-ce0511 49->50 51 ce0531-ce0567 GetNativeSystemInfo 49->51 53 ce0513-ce0518 50->53 51->42 52 ce056d-ce0589 VirtualAlloc 51->52 56 ce058b-ce059e 52->56 57 ce05a0-ce05ac 52->57 54 ce051a-ce051f 53->54 55 ce0521 53->55 58 ce0523-ce052f 54->58 55->58 56->57 59 ce05af-ce05b2 57->59 58->51 58->53 61 ce05b4-ce05bf 59->61 62 ce05c1-ce05db 59->62 61->59 63 ce05dd-ce05e2 62->63 64 ce061b-ce0622 62->64 67 ce05e4-ce05ea 63->67 65 ce06db-ce06e2 64->65 66 ce0628-ce062f 64->66 69 ce06e8-ce06f9 65->69 70 ce0864-ce086b 65->70 66->65 68 ce0635-ce0642 66->68 71 ce05ec-ce0609 67->71 72 ce060b-ce0619 67->72 68->65 75 ce0648-ce064f 68->75 76 ce0702-ce0705 69->76 73 ce0917-ce0929 70->73 74 ce0871-ce087f 70->74 71->71 71->72 72->64 72->67 77 ce092f-ce0937 73->77 78 ce0a07-ce0a1a 73->78 79 ce090e-ce0911 74->79 80 ce0654-ce0658 75->80 81 ce06fb-ce06ff 76->81 82 ce0707-ce070a 76->82 84 ce093b-ce093f 77->84 103 ce0a1c-ce0a27 78->103 104 ce0a40-ce0a4a 78->104 79->73 83 ce0884-ce08a9 79->83 85 ce06c0-ce06ca 80->85 81->76 86 ce070c-ce071d 82->86 87 ce0788-ce078e 82->87 109 ce08ab-ce08b1 83->109 110 ce0907-ce090c 83->110 90 ce09ec-ce09fa 84->90 91 ce0945-ce095a 84->91 88 ce06cc-ce06d2 85->88 89 ce065a-ce0669 85->89 92 ce071f-ce0720 86->92 93 ce0794-ce07a2 86->93 87->93 88->80 95 ce06d4-ce06d5 88->95 99 ce067a-ce067e 89->99 100 ce066b-ce0678 89->100 90->84 101 ce0a00-ce0a01 90->101 97 ce095c-ce095e 91->97 98 ce097b-ce097d 91->98 102 ce0722-ce0784 92->102 105 ce085d-ce085e 93->105 106 ce07a8 93->106 95->65 111 ce096e-ce0979 97->111 112 ce0960-ce096c 97->112 114 ce097f-ce0981 98->114 115 ce09a2-ce09a4 98->115 116 ce068c-ce0690 99->116 117 ce0680-ce068a 99->117 113 ce06bd-ce06be 100->113 101->78 102->102 118 ce0786 102->118 119 ce0a38-ce0a3e 103->119 107 ce0a4c-ce0a54 104->107 108 ce0a7b-ce0a8e 104->108 105->70 120 ce07ae-ce07d4 106->120 107->108 124 ce0a56-ce0a79 RtlAddFunctionTable 107->124 108->42 121 ce08bb-ce08c8 109->121 122 ce08b3-ce08b9 109->122 110->79 125 ce09be-ce09bf 111->125 112->125 113->85 126 ce0989-ce098b 114->126 127 ce0983-ce0987 114->127 131 ce09ac-ce09bb 115->131 132 ce09a6-ce09aa 115->132 129 ce06a5-ce06a9 116->129 130 ce0692-ce06a3 116->130 128 ce06b6-ce06ba 117->128 118->93 119->104 123 ce0a29-ce0a35 119->123 144 ce07d6-ce07d9 120->144 145 ce0835-ce0839 120->145 135 ce08ca-ce08d1 121->135 136 ce08d3-ce08e5 121->136 134 ce08ea-ce08fe 122->134 123->119 124->108 133 ce09c5-ce09cb 125->133 126->115 139 ce098d-ce098f 126->139 127->125 128->113 129->113 140 ce06ab-ce06b3 129->140 130->128 131->125 132->125 141 ce09cd-ce09d3 133->141 142 ce09d9-ce09e9 VirtualProtect 133->142 134->110 153 ce0900-ce0905 134->153 135->135 135->136 136->134 146 ce0999-ce09a0 139->146 147 ce0991-ce0997 139->147 140->128 141->142 142->90 149 ce07db-ce07e1 144->149 150 ce07e3-ce07f0 144->150 151 ce083b 145->151 152 ce0844-ce0850 145->152 146->133 147->125 154 ce0812-ce082c 149->154 155 ce07fb-ce080d 150->155 156 ce07f2-ce07f9 150->156 151->152 152->120 157 ce0856-ce0857 152->157 153->109 154->145 159 ce082e-ce0833 154->159 155->154 156->155 156->156 157->105 159->144
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383425669.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_ce0000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                      • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                      • API String ID: 394283112-2517549848
                                                                      • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                      • Instruction ID: eae5a9ca38ae2093e3d70aee833b5dc792f28472fee6e47c0dc7f2d95f90b70d
                                                                      • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                      • Instruction Fuzzy Hash: 6E72E630618B8C8BDB29DF19C8856B9B7E1FB98305F20562DE8DAC7211DB74D582CBC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 238 180011e5c-180011f0e call 1800153f4 241 180011f11-180011f17 238->241 242 18001228a-180012290 241->242 243 180011f1d 241->243 244 180012534-180012596 call 180025c30 242->244 245 180012296-18001229c 242->245 246 180011f23-180011f29 243->246 247 1800121da-180012280 call 180011ccc 243->247 261 1800125a2 244->261 262 180012598-18001259d 244->262 249 1800122a2-1800122a8 245->249 250 180012449-180012525 call 180015ae0 245->250 251 1800121d0-1800121d5 246->251 252 180011f2f-180011f35 246->252 247->242 255 1800123f7-180012439 call 180025c30 249->255 256 1800122ae-1800122b4 249->256 269 18001252a-18001252f 250->269 251->241 257 1800125c4-180012680 call 180011ccc 252->257 258 180011f3b-180011f41 252->258 273 180012685-1800126a5 255->273 280 18001243f-180012444 255->280 263 1800125b3-1800125b9 256->263 264 1800122ba-1800123f2 call 18000a02c call 180011624 256->264 257->273 267 1800121b6-1800121cb 258->267 268 180011f47-180011f4d 258->268 271 1800125a7-1800125b0 261->271 270 180012115-180012121 262->270 263->273 274 1800125bf 263->274 264->271 267->241 276 180011f53-180011f59 268->276 277 180012126-180012198 call 18001917c 268->277 269->270 270->241 271->263 274->241 276->263 281 180011f5f-1800120af call 18000bab8 276->281 284 18001219d-1800121b1 277->284 280->270 281->269 287 1800120b5-180012112 call 1800216e4 281->287 284->270 287->270
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: :j$UI$UI$/$5$@u
                                                                      • API String ID: 0-1744832406
                                                                      • Opcode ID: d5fbd5fb42e64105118402a22ae1fd0938665267daf4f484be707b3cdea1b60d
                                                                      • Instruction ID: 62cabd7460019d857fad8ef6802a9940dae2da1dd4c69d60ad9891f806a9e916
                                                                      • Opcode Fuzzy Hash: d5fbd5fb42e64105118402a22ae1fd0938665267daf4f484be707b3cdea1b60d
                                                                      • Instruction Fuzzy Hash: 35421971A1470EDFCB58DFA8C49A6EEBBF2FB44348F008159E806A7250DB719619CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 340 180026f14-180026f3c 341 180026f41-180026f46 340->341 342 18002766b-180027670 341->342 343 180026f4c 341->343 344 180027966-1800279f8 call 180008534 call 18000efa8 342->344 345 180027676-18002767b 342->345 346 180026f52-180026f57 343->346 347 18002756c-180027666 call 18001cabc call 18000efa8 call 1800207c4 343->347 372 1800279fd-180027a68 call 1800207c4 344->372 349 180027681-180027686 345->349 350 180027817-1800278bc call 18000bc70 call 18000efa8 345->350 351 180027438-1800274dd call 180026c80 call 18000efa8 346->351 352 180026f5d-180026f62 346->352 347->341 356 18002768c-180027691 349->356 357 1800277bf-180027812 call 180025c30 349->357 388 1800278c1-180027961 call 1800207c4 350->388 390 1800274e2-180027567 call 1800207c4 351->390 359 180026f68-180026f6d 352->359 360 180027320-1800273b3 call 1800257c0 call 18000efa8 352->360 367 180027697-180027740 call 180021754 call 18000efa8 356->367 368 180027a6d-180027a72 356->368 357->341 370 180026f73-180026f78 359->370 371 180027204-18002731b call 18000b948 call 18000efa8 call 1800207c4 359->371 395 1800273b8-180027433 call 1800207c4 360->395 402 180027745-1800277ba call 1800207c4 367->402 376 1800270c4-1800270ce 368->376 377 180027a78 368->377 381 1800270cf-18002718a call 18002b1d4 call 18000efa8 370->381 382 180026f7e-180026f83 370->382 371->341 372->368 377->341 413 18002718f-1800271ff call 1800207c4 381->413 382->368 391 180026f89-180027052 call 180015df4 call 18000efa8 382->391 388->341 390->341 415 180027057-1800270bf call 1800207c4 391->415 395->341 402->341 413->341 415->376
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: F:^-$[9S$zUP$?'3$yc
                                                                      • API String ID: 0-3875576172
                                                                      • Opcode ID: 149e3d3d365d4ff99a41c49fe7a0ea6fd866fcc9ad2b25dafda07a3e1acf3aff
                                                                      • Instruction ID: acf5a29543b44a4ac2cab22a28fc6f208f1c2d96f0abb29e90a070f971d4b191
                                                                      • Opcode Fuzzy Hash: 149e3d3d365d4ff99a41c49fe7a0ea6fd866fcc9ad2b25dafda07a3e1acf3aff
                                                                      • Instruction Fuzzy Hash: 13720C7050038E8FDF49DF24C88A6DE3BA1FB68388F114619FC56962A1C7B4DA65CBC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 420 180016320-180016344 421 18001634b-180016350 420->421 422 180016546-18001657e call 180011624 421->422 423 180016356-18001635b 421->423 431 180016583-180016588 422->431 425 180016361-180016366 423->425 426 18001658f-1800165d0 call 180011624 423->426 429 18001636c-180016371 425->429 430 1800164ae-180016541 call 18001917c 425->430 432 1800165d5-1800165e1 426->432 433 180016411-180016493 call 18000cec4 429->433 434 180016377-18001637c 429->434 430->421 431->432 439 18001658a 431->439 444 180016498-18001649e 433->444 436 1800163e9-1800163f7 434->436 437 18001637e-180016383 434->437 443 1800163fd-180016401 436->443 441 180016385-18001638a 437->441 442 180016397-1800163e4 call 180008350 437->442 439->421 441->431 445 180016390-180016395 441->445 442->421 447 180016403-18001640c 443->447 448 1800163f9-1800163fa 443->448 444->432 449 1800164a4-1800164a9 444->449 445->421 447->421 448->443 449->421
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !$>]$>]$vM/${Wo
                                                                      • API String ID: 0-1672528178
                                                                      • Opcode ID: 3476f63b1fd483a3e4edb66e4c1250727eb216b571a6250b7c7aa87006e10f17
                                                                      • Instruction ID: 47ac1da3a1e26fe678bf2a9ce2069fe56df1d0f6d245f307fc2b30da9b08538d
                                                                      • Opcode Fuzzy Hash: 3476f63b1fd483a3e4edb66e4c1250727eb216b571a6250b7c7aa87006e10f17
                                                                      • Instruction Fuzzy Hash: 5C81197051464CABDBE9DF28C8C9BDD3BA0FB58394F906119FD02862A0DB74D9C5CB81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 542 180001378-18000139d 543 1800013a2 542->543 544 1800013a7-1800013ad 543->544 545 1800013b3-1800013b9 544->545 546 1800017a5-1800018d3 call 180011ccc * 2 544->546 548 1800016a8-1800017a0 call 180025c30 * 2 545->548 549 1800013bf-1800013c5 545->549 565 1800018d8 546->565 548->543 552 1800013cb-1800013d1 549->552 553 1800018ee-1800019a7 call 1800113e0 549->553 557 180001504-1800015f6 call 180003840 call 1800140d8 552->557 558 1800013d7-1800013d9 552->558 561 1800019ac-1800019b6 553->561 574 1800015fb-1800016a3 call 1800207c4 557->574 563 1800018dd-1800018e3 558->563 564 1800013df-1800014e9 call 180017620 558->564 563->561 567 1800018e9 563->567 572 1800014fa-1800014ff 564->572 573 1800014eb-1800014f5 564->573 565->563 567->544 572->543 573->543 574->565
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %DcZ$L\`$u%$vr
                                                                      • API String ID: 0-873403245
                                                                      • Opcode ID: 2030f1da5196c9f476bb93962b4ebdec29646a183379a03d07fdefea4280d3e9
                                                                      • Instruction ID: 7a4330a3d3912fed14e69a2d18b4041e28774fe6b527757d4cbe653c4a95fa98
                                                                      • Opcode Fuzzy Hash: 2030f1da5196c9f476bb93962b4ebdec29646a183379a03d07fdefea4280d3e9
                                                                      • Instruction Fuzzy Hash: 0912F47152068CDFCB8CDF28C88AADD7BA1FB48398F956219FD0A97250D774D984CB84
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 577 180001d58-180001d95 578 180001d9a 577->578 579 180001d9c-180001da2 578->579 580 180001da8-180001dae 579->580 581 18000248e 579->581 583 180001db4-180001dba 580->583 584 180002197-1800021a4 580->584 582 180002493-180002499 581->582 582->579 587 18000249f-1800024ac 582->587 588 180001e9b-18000201d call 18000eef4 call 1800196ec 583->588 589 180001dc0-180001dc6 583->589 585 1800021a6-1800021ac 584->585 586 1800021ae-1800021ca 584->586 590 1800021d0-180002470 call 18001d014 call 1800196ec call 180008db0 585->590 586->590 603 180002024-18000218c call 1800196ec call 180008db0 588->603 604 18000201f 588->604 589->582 592 180001dcc-180001e8b call 18001c158 589->592 607 180002475-18000247d 590->607 592->587 599 180001e91-180001e96 592->599 599->579 603->587 612 180002192 603->612 604->603 607->587 609 18000247f-180002489 607->609 609->579 612->578
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: .mZ$\$~V6k$%T
                                                                      • API String ID: 0-3287852823
                                                                      • Opcode ID: ccbc70a1b43ffc6d5414b274ff0ecbed60153be03e3051f192a6aa15e06d1cac
                                                                      • Instruction ID: 166b9a2b8c7d7ea13ff64321e1c32e26f96a2e299ccb60065a18498a6503f561
                                                                      • Opcode Fuzzy Hash: ccbc70a1b43ffc6d5414b274ff0ecbed60153be03e3051f192a6aa15e06d1cac
                                                                      • Instruction Fuzzy Hash: 0402E8711013C8CBEBBECFA4D885BD97BA9FB44B44F10661AE84AAE250CBB45745CB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • HeapCreate.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE5833C2), ref: 00007FF8BE588876
                                                                      • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE5833C2), ref: 00007FF8BE588891
                                                                      • HeapSetInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE5833C2), ref: 00007FF8BE5888BB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CreateInformationVersion
                                                                      • String ID:
                                                                      • API String ID: 3563531100-0
                                                                      • Opcode ID: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                      • Instruction ID: 292bf58d6a90646777cd49f4198f57822d7e6d455680c6bdc40ffc38dedd27e6
                                                                      • Opcode Fuzzy Hash: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                      • Instruction Fuzzy Hash: 16F05E78A1CA468AF7609718EC2A3792390FF48384FD09834D74D82AA5DE3D9589C700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: D"C!$r>$7
                                                                      • API String ID: 0-4181936694
                                                                      • Opcode ID: 541cc3c13b8465e2a0518f703328e58551f25428cc9c4eed4f201bddabca6e18
                                                                      • Instruction ID: 0283378d108cf163dc6514248e6e0b5631fea62f1129ef615c9b8fd25e2e86b8
                                                                      • Opcode Fuzzy Hash: 541cc3c13b8465e2a0518f703328e58551f25428cc9c4eed4f201bddabca6e18
                                                                      • Instruction Fuzzy Hash: 1BE1EF70510B4CEBDBD9DF28D8CAADD3BA0FB48394FA06219FD0686250D775D989CB81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 078$GDo$}
                                                                      • API String ID: 0-303245572
                                                                      • Opcode ID: 8956c442c33fd1cde17bd2344d54593dce01cac8c777ad426ea07fe8eec3f5fb
                                                                      • Instruction ID: 0c94e6823936b68487d3afc04f5daf4118d9ac6b30c0afcc694cd4a40111a1d0
                                                                      • Opcode Fuzzy Hash: 8956c442c33fd1cde17bd2344d54593dce01cac8c777ad426ea07fe8eec3f5fb
                                                                      • Instruction Fuzzy Hash: 32D1CAB051A784AFC398DF28C1CA94BBBE0FB84754F906A1DF88686260D7B0D945CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: e@-0$f $wC
                                                                      • API String ID: 0-2741453468
                                                                      • Opcode ID: 6e670c046987691f0a1e9af823784eece018238e228c51a72b7d39087d84c909
                                                                      • Instruction ID: f8f9b13c1cb793f3116966172e7ed192e0f5529545d7cab8ca7c6d0d9d04acad
                                                                      • Opcode Fuzzy Hash: 6e670c046987691f0a1e9af823784eece018238e228c51a72b7d39087d84c909
                                                                      • Instruction Fuzzy Hash: E2319571518B848FD3A8DF28C48975ABBE1FB84344F608A1DE6DACB260DB709549CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: L=`$rKS(
                                                                      • API String ID: 0-4157335196
                                                                      • Opcode ID: 0ffd1ea2413f9b71380f5aeaf5e19bad7dcec336af59defbaf39c2d3ae1cfae5
                                                                      • Instruction ID: c6b4aee86e77721e5ec6a37c1ce5251b52915c7d30808e23b45806a77bf6ffc0
                                                                      • Opcode Fuzzy Hash: 0ffd1ea2413f9b71380f5aeaf5e19bad7dcec336af59defbaf39c2d3ae1cfae5
                                                                      • Instruction Fuzzy Hash: FD51BC705183848FC769DF29C18A64BBBF1FBC6784F108A1DE69A86261D772D909CF43
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Wm$`W
                                                                      • API String ID: 0-829970788
                                                                      • Opcode ID: 1814abb82c64624d0c82e6b0c2fd8fef1d44b2e07111184ee76eb17802e65ade
                                                                      • Instruction ID: 3e5335a01fca1db20c73b4a4a46b2fe43dbf21032e81bd0b2231691c24575172
                                                                      • Opcode Fuzzy Hash: 1814abb82c64624d0c82e6b0c2fd8fef1d44b2e07111184ee76eb17802e65ade
                                                                      • Instruction Fuzzy Hash: F041C070D1461C8FCF48DFA9D886ADDBBB0FB48304F20821DE456B6260C7789948CF69
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8h
                                                                      • API String ID: 0-2787117397
                                                                      • Opcode ID: d20b5c2dabe29708a31ba0e8275e2e5ac6bcf12f9e6970397621dbc27d768f27
                                                                      • Instruction ID: eb392778bd881193a348804f8d52045fa41d3382a0d9eae0dd8f361f159f4541
                                                                      • Opcode Fuzzy Hash: d20b5c2dabe29708a31ba0e8275e2e5ac6bcf12f9e6970397621dbc27d768f27
                                                                      • Instruction Fuzzy Hash: 28D12E7060578C8FEBBADF24CC997DE3BA0FB49744F504219D88A8E260CB745B49CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _calloc_dbg$__initmbctable_invalid_parameter_invoke_watson_if_error
                                                                      • String ID: _setenvp$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdenvp.c$strcpy_s(*env, cchars, p)$~
                                                                      • API String ID: 1648969265-681193798
                                                                      • Opcode ID: 7e1fe505fd56acdb14f78debd1a12e937537e8dbef1c806f5e343d777d2f76cd
                                                                      • Instruction ID: 045d0a4f47999c5d440f0924c9c8cd0db9b86dc3eb4b0f6c47869685c9d7a8d4
                                                                      • Opcode Fuzzy Hash: 7e1fe505fd56acdb14f78debd1a12e937537e8dbef1c806f5e343d777d2f76cd
                                                                      • Instruction Fuzzy Hash: FD517031A1CB4189E760DB19E8A072A77A4FB857C4F501236FB9E877A6CF7DE4408B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\a_env.c
                                                                      • API String ID: 1823725401-2473407871
                                                                      • Opcode ID: 2fea13ac07d8f022f3d86b1cc1b99bf950f7c5081f441752a002fe175989ec87
                                                                      • Instruction ID: 5ced7ed8e1c6b92fb5113e74a023591da0836c2cfb2a15ac96f02d82a198641b
                                                                      • Opcode Fuzzy Hash: 2fea13ac07d8f022f3d86b1cc1b99bf950f7c5081f441752a002fe175989ec87
                                                                      • Instruction Fuzzy Hash: B141F87661CB858AE7608B5AF85532BB7A0FB84794F500035EBCD87B69DF7DD0448B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00007FF8BE587540: _initp_misc_winsig.LIBCMTD ref: 00007FF8BE58757B
                                                                        • Part of subcall function 00007FF8BE587540: _initp_eh_hooks.LIBCMTD ref: 00007FF8BE587585
                                                                        • Part of subcall function 00007FF8BE588FE0: InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 00007FF8BE58906F
                                                                      • FlsAlloc.KERNEL32 ref: 00007FF8BE583D55
                                                                        • Part of subcall function 00007FF8BE583E00: FlsFree.KERNEL32 ref: 00007FF8BE583E13
                                                                        • Part of subcall function 00007FF8BE583E00: _mtdeletelocks.LIBCMTD ref: 00007FF8BE583E23
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: AllocCountCriticalFreeInitializeSectionSpin_initp_eh_hooks_initp_misc_winsig_mtdeletelocks
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tidtable.c
                                                                      • API String ID: 3828364660-3898981997
                                                                      • Opcode ID: d477e7b81e7d5bc1b77b4ca7ebd045b02c1d24898f8e6974664b8d56d25d9aa1
                                                                      • Instruction ID: 51bcb221546c46b382563d85aeefaed9849b9c7f079cac8ca3ee462076593b5e
                                                                      • Opcode Fuzzy Hash: d477e7b81e7d5bc1b77b4ca7ebd045b02c1d24898f8e6974664b8d56d25d9aa1
                                                                      • Instruction Fuzzy Hash: E3111F3492D6428EF760AB6CEC767792661BF447D1F005235E7BE466D6DF3CE4048640
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      C-Code - Quality: 16%
                                                                      			E00007FF87FF8BE58F570(intOrPtr __edx, long long __rcx, void* __rdx, long long __r8, void* _a8, intOrPtr _a16, long long _a24, intOrPtr _a32, void* _a40, intOrPtr _a48, intOrPtr _a64) {
                                                                      				long long _v24;
                                                                      				intOrPtr _v32;
                                                                      				long long _v40;
                                                                      				signed int _v48;
                                                                      				int _v52;
                                                                      				int _v56;
                                                                      				signed int _v64;
                                                                      				long long _v72;
                                                                      				void* _t53;
                                                                      				long long _t82;
                                                                      
                                                                      				_a32 = r9d;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __edx;
                                                                      				_a8 = __rcx;
                                                                      				_v56 = 0;
                                                                      				if (_a48 != 0) goto 0xbe58f5ab;
                                                                      				_a48 =  *((intOrPtr*)( *_a8 + 4));
                                                                      				if (_a64 == 0) goto 0xbe58f5bf;
                                                                      				_v32 = 9;
                                                                      				goto 0xbe58f5c7;
                                                                      				_v32 = 1;
                                                                      				_v64 = 0;
                                                                      				_v72 = 0;
                                                                      				r9d = _a32;
                                                                      				_v48 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                                      				if (_v48 != 0) goto 0xbe58f60b;
                                                                      				goto 0xbe58f6f8;
                                                                      				if (0 != 0) goto 0xbe58f652;
                                                                      				if (_v48 <= 0) goto 0xbe58f652;
                                                                      				if (_v48 - 0xfffffff0 > 0) goto 0xbe58f652;
                                                                      				_t82 = _v48 + _v48 + 0x10;
                                                                      				_t53 = malloc(??); // executed
                                                                      				E00007FF87FF8BE58F3B0(_t53, 0xdddd, _t82);
                                                                      				_v24 = _t82;
                                                                      				goto 0xbe58f65b;
                                                                      				_v24 = 0;
                                                                      				_v40 = _v24;
                                                                      				if (_v40 != 0) goto 0xbe58f674;
                                                                      				goto 0xbe58f6f8;
                                                                      				E00007FF87FF8BE5832B0(0, _a48, 0, _v40, __rdx, _v48 << 1);
                                                                      				_v64 = _v48;
                                                                      				_v72 = _v40;
                                                                      				r9d = _a32;
                                                                      				_v52 = MultiByteToWideChar(??, ??, ??, ??, ??, ??);
                                                                      				if (_v52 == 0) goto 0xbe58f6ea;
                                                                      				r8d = _v52;
                                                                      				_v56 = GetStringTypeW(??, ??, ??, ??);
                                                                      				E00007FF87FF8BE58F3E0(_v40);
                                                                      				return _v56;
                                                                      			}













                                                                      0x7ff8be58f570
                                                                      0x7ff8be58f575
                                                                      0x7ff8be58f57a
                                                                      0x7ff8be58f57e
                                                                      0x7ff8be58f587
                                                                      0x7ff8be58f597
                                                                      0x7ff8be58f5a4
                                                                      0x7ff8be58f5b3
                                                                      0x7ff8be58f5b5
                                                                      0x7ff8be58f5bd
                                                                      0x7ff8be58f5bf
                                                                      0x7ff8be58f5c7
                                                                      0x7ff8be58f5cf
                                                                      0x7ff8be58f5d8
                                                                      0x7ff8be58f5f9
                                                                      0x7ff8be58f602
                                                                      0x7ff8be58f606
                                                                      0x7ff8be58f60f
                                                                      0x7ff8be58f616
                                                                      0x7ff8be58f62a
                                                                      0x7ff8be58f631
                                                                      0x7ff8be58f639
                                                                      0x7ff8be58f646
                                                                      0x7ff8be58f64b
                                                                      0x7ff8be58f650
                                                                      0x7ff8be58f652
                                                                      0x7ff8be58f660
                                                                      0x7ff8be58f66b
                                                                      0x7ff8be58f66f
                                                                      0x7ff8be58f686
                                                                      0x7ff8be58f68f
                                                                      0x7ff8be58f698
                                                                      0x7ff8be58f69d
                                                                      0x7ff8be58f6bf
                                                                      0x7ff8be58f6c8
                                                                      0x7ff8be58f6d2
                                                                      0x7ff8be58f6e6
                                                                      0x7ff8be58f6ef
                                                                      0x7ff8be58f6fc

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocaMarkStringTypemalloc
                                                                      • String ID:
                                                                      • API String ID: 2618398691-0
                                                                      • Opcode ID: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                                      • Instruction ID: 37a0598418a0f0715b43810b8f674ce5512f0d1576ff5a6f229136bccea5e9ab
                                                                      • Opcode Fuzzy Hash: 05827e3f81ca9d4f9e036e9cc38fe06689f9ef4e573a4afec1c92632646a1a95
                                                                      • Instruction Fuzzy Hash: 3F410A3651C7858AD7608B19E89436AB7A0F789794F104235EB9E43BA9DF7CD444CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleName__initmbctable
                                                                      • String ID: C:\Windows\SYSTEM32\regsvr32.exe$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdargv.c
                                                                      • API String ID: 3548084100-2649671803
                                                                      • Opcode ID: b22e410beffd46978b7d2afc3cd069083579849eea9e12d44582c014dad21e95
                                                                      • Instruction ID: 9b71ddf481af9c2b071ab898d8cf9adc66a5cf30f64e3e198c67a9857980b798
                                                                      • Opcode Fuzzy Hash: b22e410beffd46978b7d2afc3cd069083579849eea9e12d44582c014dad21e95
                                                                      • Instruction Fuzzy Hash: 3241003162DA8589EA60CB58ECA037A7760FB857E4F901636E7AE42BF5DF3DD1448700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      C-Code - Quality: 23%
                                                                      			E00007FF87FF8BE58A5E0(long long __rcx, void* _a8) {
                                                                      				signed int _v24;
                                                                      				char _v42;
                                                                      				void* _v48;
                                                                      				signed int _v56;
                                                                      				char _v312;
                                                                      				signed char* _v328;
                                                                      				char _v584;
                                                                      				char _v840;
                                                                      				char _v1352;
                                                                      				char _v1384;
                                                                      				char _v1392;
                                                                      				intOrPtr _v1400;
                                                                      				long long _v1408;
                                                                      				long long _v1416;
                                                                      				signed long long _t206;
                                                                      				signed char* _t214;
                                                                      				signed long long _t223;
                                                                      				intOrPtr _t225;
                                                                      				intOrPtr _t226;
                                                                      				signed long long _t233;
                                                                      
                                                                      				_t224 = __rcx;
                                                                      				_a8 = __rcx;
                                                                      				_t206 =  *0xbe5ab018; // 0x6e64df9072ef
                                                                      				_v24 = _t206 ^ _t233;
                                                                      				if (GetCPInfo(??, ??) == 0) goto 0xbe58a906;
                                                                      				_v56 = 0;
                                                                      				goto 0xbe58a63c;
                                                                      				_v56 = _v56 + 1;
                                                                      				if (_v56 - 0x100 >= 0) goto 0xbe58a661;
                                                                      				 *((char*)(_t233 + _a8 + 0x470)) = _v56 & 0x000000ff;
                                                                      				goto 0xbe58a62c;
                                                                      				_v312 = 0x20;
                                                                      				_v328 =  &_v42;
                                                                      				goto 0xbe58a68f;
                                                                      				_v328 =  &(_v328[2]);
                                                                      				if (( *_v328 & 0x000000ff) == 0) goto 0xbe58a6ea;
                                                                      				_v56 =  *_v328 & 0x000000ff;
                                                                      				goto 0xbe58a6c2;
                                                                      				_v56 = _v56 + 1;
                                                                      				_t214 = _v328;
                                                                      				if (_v56 - ( *(_t214 + 1) & 0x000000ff) > 0) goto 0xbe58a6e8;
                                                                      				 *((char*)(_t233 + _t214 + 0x470)) = 0x20;
                                                                      				goto 0xbe58a6b2;
                                                                      				goto 0xbe58a67b;
                                                                      				_v1392 = 0;
                                                                      				_v1400 =  *((intOrPtr*)(_a8 + 0xc));
                                                                      				_v1408 =  *((intOrPtr*)(_a8 + 4));
                                                                      				_v1416 =  &_v1352;
                                                                      				r9d = 0x100;
                                                                      				E00007FF87FF8BE58F4D0(1,  &_v1352, __rcx,  &_v312); // executed
                                                                      				_v1384 = 0;
                                                                      				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                                      				_v1400 = 0x100;
                                                                      				_v1408 =  &_v840;
                                                                      				_v1416 = 0x100;
                                                                      				r8d = 0x100;
                                                                      				E00007FF87FF8BE58EF00( *((intOrPtr*)(_a8 + 0xc)), _a8, _t224,  &_v312);
                                                                      				_v1384 = 0;
                                                                      				_v1392 =  *((intOrPtr*)(_a8 + 4));
                                                                      				_v1400 = 0x100;
                                                                      				_v1408 =  &_v584;
                                                                      				_v1416 = 0x100;
                                                                      				r8d = 0x200;
                                                                      				_t223 = _a8;
                                                                      				E00007FF87FF8BE58EF00( *((intOrPtr*)(_t223 + 0xc)), _t223, _t224,  &_v312);
                                                                      				_v56 = 0;
                                                                      				_v56 = _v56 + 1;
                                                                      				if (_v56 - 0x100 >= 0) goto 0xbe58a901;
                                                                      				if (( *(_t233 + 0x60 + _t223 * 2) & 1) == 0) goto 0xbe58a879;
                                                                      				_t225 = _a8;
                                                                      				 *((char*)(_a8 + _t225 + 0x1c)) =  *(_t225 + _t223 + 0x1c) & 0x000000ff | 0x00000010;
                                                                      				 *((char*)(_a8 + _t225 + 0x11d)) =  *(_t233 + _t223 + 0x260) & 0x000000ff;
                                                                      				goto 0xbe58a8fc;
                                                                      				if (( *(_t233 + 0x60 + _t223 * 2) & 2) == 0) goto 0xbe58a8e5;
                                                                      				_t226 = _a8;
                                                                      				 *((char*)(_a8 + _t226 + 0x1c)) =  *(_t226 + _t223 + 0x1c) & 0x000000ff | 0x00000020;
                                                                      				 *((char*)(_a8 + _t226 + 0x11d)) =  *(_t233 + _t223 + 0x360) & 0x000000ff;
                                                                      				goto 0xbe58a8fc;
                                                                      				 *((char*)(_a8 + _t223 + 0x11d)) = 0;
                                                                      				goto L1;
                                                                      				goto 0xbe58aa20;
                                                                      				_v56 = 0;
                                                                      				_v56 = _v56 + 1;
                                                                      				_v56 = _v56 + 1;
                                                                      				if (_v56 - 0x100 >= 0) goto 0xbe58aa20;
                                                                      				if (_v56 - 0x41 < 0) goto 0xbe58a99c;
                                                                      				if (_v56 - 0x5a > 0) goto 0xbe58a99c;
                                                                      				_v56 = _v56 + 1;
                                                                      				__rcx = _a8;
                                                                      				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000010;
                                                                      				_v56 = _v56 + 1;
                                                                      				__rdx = _a8;
                                                                      				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                                      				_v56 = _v56 + 0x20;
                                                                      				__ecx = _v56;
                                                                      				__rdx = _a8;
                                                                      				 *((char*)(_a8 + __rcx + 0x11d)) = __al;
                                                                      				goto 0xbe58aa1b;
                                                                      				if (_v56 - 0x61 < 0) goto 0xbe58aa04;
                                                                      				if (_v56 - 0x7a > 0) goto 0xbe58aa04;
                                                                      				_v56 = _v56 + 1;
                                                                      				__rcx = _a8;
                                                                      				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000020;
                                                                      				_v56 = _v56 + 1;
                                                                      				__rdx = _a8;
                                                                      				 *((char*)(_a8 + __rcx + 0x1c)) = __al;
                                                                      				_v56 = _v56 - 0x20;
                                                                      				__ecx = _v56;
                                                                      				__rdx = _a8;
                                                                      				 *((char*)(__rdx + __rcx + 0x11d)) = __al;
                                                                      				goto 0xbe58aa1b;
                                                                      				__eax = _v56;
                                                                      				__rcx = _a8;
                                                                      				 *((char*)(_a8 + __rax + 0x11d)) = 0;
                                                                      				goto L2;
                                                                      				__rcx = _v24;
                                                                      				__rcx = _v24 ^ __rsp;
                                                                      				return E00007FF87FF8BE583280(_v56, _v56, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                      			}























                                                                      0x7ff8be58a5e0
                                                                      0x7ff8be58a5e0
                                                                      0x7ff8be58a5ec
                                                                      0x7ff8be58a5f6
                                                                      0x7ff8be58a619
                                                                      0x7ff8be58a61f
                                                                      0x7ff8be58a62a
                                                                      0x7ff8be58a635
                                                                      0x7ff8be58a647
                                                                      0x7ff8be58a658
                                                                      0x7ff8be58a65f
                                                                      0x7ff8be58a661
                                                                      0x7ff8be58a671
                                                                      0x7ff8be58a679
                                                                      0x7ff8be58a687
                                                                      0x7ff8be58a69c
                                                                      0x7ff8be58a6a9
                                                                      0x7ff8be58a6b0
                                                                      0x7ff8be58a6bb
                                                                      0x7ff8be58a6c2
                                                                      0x7ff8be58a6d5
                                                                      0x7ff8be58a6de
                                                                      0x7ff8be58a6e6
                                                                      0x7ff8be58a6e8
                                                                      0x7ff8be58a6ea
                                                                      0x7ff8be58a6fd
                                                                      0x7ff8be58a70c
                                                                      0x7ff8be58a715
                                                                      0x7ff8be58a71a
                                                                      0x7ff8be58a72f
                                                                      0x7ff8be58a734
                                                                      0x7ff8be58a747
                                                                      0x7ff8be58a74b
                                                                      0x7ff8be58a75b
                                                                      0x7ff8be58a760
                                                                      0x7ff8be58a770
                                                                      0x7ff8be58a783
                                                                      0x7ff8be58a788
                                                                      0x7ff8be58a79b
                                                                      0x7ff8be58a79f
                                                                      0x7ff8be58a7af
                                                                      0x7ff8be58a7b4
                                                                      0x7ff8be58a7c4
                                                                      0x7ff8be58a7ca
                                                                      0x7ff8be58a7d7
                                                                      0x7ff8be58a7dc
                                                                      0x7ff8be58a7f2
                                                                      0x7ff8be58a804
                                                                      0x7ff8be58a81b
                                                                      0x7ff8be58a828
                                                                      0x7ff8be58a84b
                                                                      0x7ff8be58a86d
                                                                      0x7ff8be58a874
                                                                      0x7ff8be58a88a
                                                                      0x7ff8be58a897
                                                                      0x7ff8be58a8ba
                                                                      0x7ff8be58a8dc
                                                                      0x7ff8be58a8e3
                                                                      0x7ff8be58a8f4
                                                                      0x7ff8be58a8fc
                                                                      0x7ff8be58a901
                                                                      0x7ff8be58a906
                                                                      0x7ff8be58a91a
                                                                      0x7ff8be58a91c
                                                                      0x7ff8be58a92e
                                                                      0x7ff8be58a93c
                                                                      0x7ff8be58a946
                                                                      0x7ff8be58a94f
                                                                      0x7ff8be58a953
                                                                      0x7ff8be58a960
                                                                      0x7ff8be58a96a
                                                                      0x7ff8be58a96e
                                                                      0x7ff8be58a976
                                                                      0x7ff8be58a981
                                                                      0x7ff8be58a984
                                                                      0x7ff8be58a98b
                                                                      0x7ff8be58a993
                                                                      0x7ff8be58a99a
                                                                      0x7ff8be58a9a4
                                                                      0x7ff8be58a9ae
                                                                      0x7ff8be58a9b7
                                                                      0x7ff8be58a9bb
                                                                      0x7ff8be58a9c8
                                                                      0x7ff8be58a9d2
                                                                      0x7ff8be58a9d6
                                                                      0x7ff8be58a9de
                                                                      0x7ff8be58a9e9
                                                                      0x7ff8be58a9ec
                                                                      0x7ff8be58a9f3
                                                                      0x7ff8be58a9fb
                                                                      0x7ff8be58aa02
                                                                      0x7ff8be58aa04
                                                                      0x7ff8be58aa0b
                                                                      0x7ff8be58aa13
                                                                      0x7ff8be58aa1b
                                                                      0x7ff8be58aa20
                                                                      0x7ff8be58aa28
                                                                      0x7ff8be58aa37

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Info
                                                                      • String ID: $z
                                                                      • API String ID: 1807457897-2251613814
                                                                      • Opcode ID: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                                      • Instruction ID: 975d5bdea84138eebe5c242958439d8e47cdd3c036e0c41a679b36a1a1a54a98
                                                                      • Opcode Fuzzy Hash: 939841bcdfd8ad812f8c29de7d09562b703ae5a82c5ff0fab969d8d2fb6d5a5e
                                                                      • Instruction Fuzzy Hash: A0B1CC7261CAC0CAD7758B29E8503ABB7A0F789785F045225DBDD83B9ADB2CD441DF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale_unlock$UpdateUpdate::~___updatetmbcinfo
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbctype.c
                                                                      • API String ID: 4112623284-4095683531
                                                                      • Opcode ID: 587d7c63c2f280d76f00a5a6279b212f57539b6122539f303ec6642172553049
                                                                      • Instruction ID: 4bbf1a75f2fde1dd6231879299819a39372e5b3e867c12d5dd4b4f984d2f1a17
                                                                      • Opcode Fuzzy Hash: 587d7c63c2f280d76f00a5a6279b212f57539b6122539f303ec6642172553049
                                                                      • Instruction Fuzzy Hash: A4910E3661D7858AE7B08B19E8A036A7BA0FB887D4F444235EB9D437A9DF3CD541CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 50%
                                                                      			E00007FF87FF8BE58461B(void* __rdx, void* __r8, long long _a32, long long _a40, intOrPtr _a64, long long _a72, void* _a80, intOrPtr _a88, long long _a96, long long _a128, signed int _a136, long long _a144, intOrPtr _a152, void* _a160) {
                                                                      				signed int _t64;
                                                                      				intOrPtr _t66;
                                                                      				void* _t73;
                                                                      				void* _t92;
                                                                      				long long _t98;
                                                                      				long long _t113;
                                                                      				long long _t114;
                                                                      				long long _t115;
                                                                      				long long _t130;
                                                                      				intOrPtr _t132;
                                                                      				long long _t135;
                                                                      
                                                                      				if (_a136 == 1) goto 0xbe584672;
                                                                      				_t64 = _a136 & 0x0000ffff;
                                                                      				if (_t64 == 2) goto 0xbe584672;
                                                                      				if (_a136 == 3) goto 0xbe584672;
                                                                      				_a40 = "Error: memory allocation: bad memory block type.\n";
                                                                      				_a32 = "%s";
                                                                      				r9d = 0;
                                                                      				r8d = 0;
                                                                      				0xbe58ad00();
                                                                      				if (_t64 != 1) goto 0xbe584672;
                                                                      				asm("int3");
                                                                      				_t98 = _a128 + 0x34;
                                                                      				_a96 = _t98;
                                                                      				0xbe58ac90(); // executed
                                                                      				_a80 = _t98;
                                                                      				if (_a80 != 0) goto 0xbe5846b8;
                                                                      				if (_a160 == 0) goto 0xbe5846b3;
                                                                      				 *_a160 = 0xc;
                                                                      				goto 0xbe5848b4;
                                                                      				_t66 =  *0xbe5ab03c; // 0x37
                                                                      				 *0xbe5ab03c = _t66 + 1;
                                                                      				if (_a64 == 0) goto 0xbe58472d;
                                                                      				 *_a80 = 0;
                                                                      				 *((long long*)(_a80 + 8)) = 0;
                                                                      				 *((long long*)(_a80 + 0x10)) = 0;
                                                                      				 *((intOrPtr*)(_a80 + 0x18)) = 0xfedcbabc;
                                                                      				 *((long long*)(_a80 + 0x20)) = _a128;
                                                                      				 *(_a80 + 0x1c) = 3;
                                                                      				 *((intOrPtr*)(_a80 + 0x28)) = 0;
                                                                      				goto 0xbe584844;
                                                                      				if (0xffffffff -  *0xbe5ac960 - _a128 <= 0) goto 0xbe584763;
                                                                      				_t130 =  *0xbe5ac960; // 0x441b
                                                                      				 *0xbe5ac960 = _t130 + _a128;
                                                                      				goto 0xbe58476e;
                                                                      				 *0xbe5ac960 = 0xffffffff;
                                                                      				_t132 =  *0xbe5ac990; // 0xac2
                                                                      				 *0xbe5ac990 = _t132 + _a128;
                                                                      				_t113 =  *0xbe5ac978; // 0x33aa
                                                                      				_t92 =  *0xbe5ac990 - _t113; // 0xac2
                                                                      				if (_t92 <= 0) goto 0xbe5847a8;
                                                                      				_t114 =  *0xbe5ac990; // 0xac2
                                                                      				 *0xbe5ac978 = _t114;
                                                                      				if ( *0xbe5ac980 == 0) goto 0xbe5847c4;
                                                                      				_t115 =  *0xbe5ac980; // 0x26c0b50
                                                                      				 *((long long*)(_t115 + 8)) = _a80;
                                                                      				goto 0xbe5847d0;
                                                                      				 *0xbe5ac968 = _a80;
                                                                      				_t135 =  *0xbe5ac980; // 0x26c0b50
                                                                      				 *_a80 = _t135;
                                                                      				 *((long long*)(_a80 + 8)) = 0;
                                                                      				 *((long long*)(_a80 + 0x10)) = _a144;
                                                                      				 *((intOrPtr*)(_a80 + 0x18)) = _a152;
                                                                      				 *((long long*)(_a80 + 0x20)) = _a128;
                                                                      				 *(_a80 + 0x1c) = _a136;
                                                                      				_t78 = _a88;
                                                                      				 *((intOrPtr*)(_a80 + 0x28)) = _a88;
                                                                      				 *0xbe5ac980 = _a80;
                                                                      				r8d = 4;
                                                                      				E00007FF87FF8BE5832B0( *0xbe5ab04c & 0x000000ff, _a88,  *0xbe5ab04c & 0x000000ff, _a80 + 0x2c, __rdx, __r8);
                                                                      				_t145 = _a128;
                                                                      				r8d = 4;
                                                                      				E00007FF87FF8BE5832B0( *0xbe5ab04c & 0x000000ff, _a88,  *0xbe5ab04c & 0x000000ff, _a80 + _a128 + 0x30, _a128, __r8);
                                                                      				_t73 = E00007FF87FF8BE5832B0( *0xbe5ab04f & 0x000000ff, _t78,  *0xbe5ab04f & 0x000000ff, _a80 + 0x30, _t145, _a128);
                                                                      				_a72 = _a80 + 0x30;
                                                                      				return E00007FF87FF8BE589360(_t73, 4);
                                                                      			}














                                                                      0x7ff8be584623
                                                                      0x7ff8be58462c
                                                                      0x7ff8be584634
                                                                      0x7ff8be58463e
                                                                      0x7ff8be584647
                                                                      0x7ff8be584653
                                                                      0x7ff8be584658
                                                                      0x7ff8be58465b
                                                                      0x7ff8be584665
                                                                      0x7ff8be58466d
                                                                      0x7ff8be58466f
                                                                      0x7ff8be58467a
                                                                      0x7ff8be58467e
                                                                      0x7ff8be584688
                                                                      0x7ff8be58468d
                                                                      0x7ff8be584698
                                                                      0x7ff8be5846a3
                                                                      0x7ff8be5846ad
                                                                      0x7ff8be5846b3
                                                                      0x7ff8be5846b8
                                                                      0x7ff8be5846c0
                                                                      0x7ff8be5846cb
                                                                      0x7ff8be5846d2
                                                                      0x7ff8be5846de
                                                                      0x7ff8be5846eb
                                                                      0x7ff8be5846f8
                                                                      0x7ff8be58470c
                                                                      0x7ff8be584715
                                                                      0x7ff8be584721
                                                                      0x7ff8be584728
                                                                      0x7ff8be584743
                                                                      0x7ff8be58474d
                                                                      0x7ff8be58475a
                                                                      0x7ff8be584761
                                                                      0x7ff8be584763
                                                                      0x7ff8be584776
                                                                      0x7ff8be584783
                                                                      0x7ff8be58478a
                                                                      0x7ff8be584791
                                                                      0x7ff8be584798
                                                                      0x7ff8be58479a
                                                                      0x7ff8be5847a1
                                                                      0x7ff8be5847b0
                                                                      0x7ff8be5847b2
                                                                      0x7ff8be5847be
                                                                      0x7ff8be5847c2
                                                                      0x7ff8be5847c9
                                                                      0x7ff8be5847d5
                                                                      0x7ff8be5847dc
                                                                      0x7ff8be5847e4
                                                                      0x7ff8be5847f9
                                                                      0x7ff8be584809
                                                                      0x7ff8be584819
                                                                      0x7ff8be584829
                                                                      0x7ff8be584831
                                                                      0x7ff8be584835
                                                                      0x7ff8be58483d
                                                                      0x7ff8be584854
                                                                      0x7ff8be58485c
                                                                      0x7ff8be58486d
                                                                      0x7ff8be58487a
                                                                      0x7ff8be584882
                                                                      0x7ff8be5848a1
                                                                      0x7ff8be5848af
                                                                      0x7ff8be5848c7

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _unlock
                                                                      • String ID: Error: memory allocation: bad memory block type.
                                                                      • API String ID: 2480363372-1537269110
                                                                      • Opcode ID: 070c00f70d4df6f813f84e43e5590717d4ebcb6a3ae1d4e5f47ac26a0ae5b61c
                                                                      • Instruction ID: c199323234066a9089ac32c6953cbd3f17e52ed0314fa0574da7a37a8a118385
                                                                      • Opcode Fuzzy Hash: 070c00f70d4df6f813f84e43e5590717d4ebcb6a3ae1d4e5f47ac26a0ae5b61c
                                                                      • Instruction Fuzzy Hash: 0B71DF36A0DB858AE770CB59E8A032AB7A0F784B90F105535DB9D877A5DF7CE444CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: EncodePointer_initterm_e
                                                                      • String ID: Y
                                                                      • API String ID: 1618838664-1754117475
                                                                      • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                      • Instruction ID: a043831bfcc157604c17ed546d40a1a8d8baf6670eac9e71cad80ef11757f7f4
                                                                      • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                      • Instruction Fuzzy Hash: EEE0C93191C442DFE620EB28EC711B92765FF903C4F801231E39D824A6EF2CE984CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 46%
                                                                      			E00007FF87FF8BE583110() {
                                                                      				void* _t2;
                                                                      				intOrPtr _t3;
                                                                      				void* _t5;
                                                                      
                                                                      				_t3 =  *0xbe5ac3c8; // 0x180000000
                                                                      				E00007FF87FF8BE5811E0(_t2, _t3, "H82WX82viYR", _t5); // executed
                                                                      				ExitProcess(??);
                                                                      			}






                                                                      0x7ff8be583114
                                                                      0x7ff8be583122
                                                                      0x7ff8be583127

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ExitProcess
                                                                      • String ID: H82WX82viYR
                                                                      • API String ID: 621844428-3887106525
                                                                      • Opcode ID: 9520d05ee5257cfcb6870757d168f5deeb70c535bf89830e30f839e103e3a1eb
                                                                      • Instruction ID: aa3b0b49cdc93431eb35367889afdef4ad002289652de9fd6d1bf34d21d2d91f
                                                                      • Opcode Fuzzy Hash: 9520d05ee5257cfcb6870757d168f5deeb70c535bf89830e30f839e103e3a1eb
                                                                      • Instruction Fuzzy Hash: B7C09B15F2D50785DB14B7EAECB206813516F857C0FD07432D21C46631DD5CD79A4701
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 47%
                                                                      			E00007FF87FF8BE58A000(signed short __ecx, void* __rcx, long long __rdx, signed int _a8, void* _a16) {
                                                                      				signed int _v24;
                                                                      				signed char* _v32;
                                                                      				char _v50;
                                                                      				char _v56;
                                                                      				signed int _v72;
                                                                      				signed char* _v80;
                                                                      				signed int _v84;
                                                                      				signed int _v88;
                                                                      				signed long long _t204;
                                                                      				signed long long _t205;
                                                                      				signed long long _t206;
                                                                      				signed char* _t215;
                                                                      				signed long long _t218;
                                                                      				signed long long _t233;
                                                                      				signed long long _t234;
                                                                      
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __ecx;
                                                                      				_t204 =  *0xbe5ab018; // 0x6e64df9072ef
                                                                      				_t205 = _t204 ^ _t234;
                                                                      				_v24 = _t205;
                                                                      				_a8 = E00007FF87FF8BE589F20(_a8, _t205);
                                                                      				if (_a8 != 0) goto 0xbe58a04d;
                                                                      				E00007FF87FF8BE58A4E0(_a16);
                                                                      				goto 0xbe58a463;
                                                                      				_v84 = 0;
                                                                      				_v84 = _v84 + 1;
                                                                      				if (_t205 - 5 >= 0) goto 0xbe58a239;
                                                                      				_t206 = _t205 * 0x30;
                                                                      				if ( *((intOrPtr*)(0xbe5abb70 + _t206)) != _a8) goto 0xbe58a234;
                                                                      				_v72 = 0;
                                                                      				goto 0xbe58a0a2;
                                                                      				_v72 = _v72 + 1;
                                                                      				if (_v72 - 0x101 >= 0) goto 0xbe58a0bf;
                                                                      				 *((char*)(_a16 + _t206 + 0x1c)) = 0;
                                                                      				goto 0xbe58a098;
                                                                      				_v88 = 0;
                                                                      				goto 0xbe58a0d3;
                                                                      				_v88 = _v88 + 1;
                                                                      				if (_v88 - 4 >= 0) goto 0xbe58a197;
                                                                      				_v80 = 0x47fbeb1309700;
                                                                      				goto 0xbe58a111;
                                                                      				_v80 =  &(_v80[2]);
                                                                      				if (( *_v80 & 0x000000ff) == 0) goto 0xbe58a192;
                                                                      				if ((_v80[1] & 0x000000ff) == 0) goto 0xbe58a192;
                                                                      				_v72 =  *_v80 & 0x000000ff;
                                                                      				goto 0xbe58a142;
                                                                      				_v72 = _v72 + 1;
                                                                      				_t215 = _v80;
                                                                      				if (_v72 - ( *(_t215 + 1) & 0x000000ff) > 0) goto 0xbe58a18d;
                                                                      				_t233 = _a16;
                                                                      				 *((char*)(_t233 + 0xbe5abb70 + _t206 * 0x30 + 0x1c)) =  *(_a16 + _t215 + 0x1c) & 0x000000ff |  *0xFFF17CB576D8;
                                                                      				goto 0xbe58a138;
                                                                      				goto 0xbe58a103;
                                                                      				goto 0xbe58a0c9;
                                                                      				 *(_a16 + 4) = _a8;
                                                                      				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                      				_t218 = _a16;
                                                                      				 *(_a16 + 0xc) = E00007FF87FF8BE58A480( *((intOrPtr*)(_t218 + 4)));
                                                                      				_v88 = 0;
                                                                      				goto 0xbe58a1e7;
                                                                      				_v88 = _v88 + 1;
                                                                      				if (_v88 - 6 >= 0) goto 0xbe58a220;
                                                                      				_t205 = 0xbe5abb70;
                                                                      				 *((short*)(_a16 + 0x10 + _t233 * 2)) =  *(0xbe5abb70 + 4 + (0xbe5abb70 + _t218 * 0x30) * 2) & 0x0000ffff;
                                                                      				goto 0xbe58a1dd;
                                                                      				E00007FF87FF8BE58A5E0(_a16);
                                                                      				goto 0xbe58a463;
                                                                      				goto L1;
                                                                      				if (_a8 == 0) goto 0xbe58a271;
                                                                      				if (_a8 == 0xfde8) goto 0xbe58a271;
                                                                      				if (_a8 == 0xfde9) goto 0xbe58a271;
                                                                      				__eax = _a8 & 0x0000ffff;
                                                                      				__ecx = _a8 & 0x0000ffff;
                                                                      				if (IsValidCodePage(??) != 0) goto 0xbe58a27b;
                                                                      				__eax = 0xffffffff;
                                                                      				goto 0xbe58a463;
                                                                      				__rdx =  &_v56;
                                                                      				__ecx = _a8;
                                                                      				if (GetCPInfo(??, ??) == 0) goto 0xbe58a444;
                                                                      				_v72 = 0;
                                                                      				goto 0xbe58a2a9;
                                                                      				_v72 = _v72 + 1;
                                                                      				_v72 = _v72 + 1;
                                                                      				if (_v72 - 0x101 >= 0) goto 0xbe58a2c6;
                                                                      				__eax = _v72;
                                                                      				__rcx = _a16;
                                                                      				 *((char*)(_a16 + __rax + 0x1c)) = 0;
                                                                      				goto 0xbe58a29f;
                                                                      				__rax = _a16;
                                                                      				__ecx = _a8;
                                                                      				 *(_a16 + 4) = _a8;
                                                                      				__rax = _a16;
                                                                      				 *(_a16 + 0xc) = 0;
                                                                      				if (_v56 - 1 <= 0) goto 0xbe58a3f4;
                                                                      				__rax =  &_v50;
                                                                      				_v32 =  &_v50;
                                                                      				goto 0xbe58a30c;
                                                                      				_v32 =  &(_v32[2]);
                                                                      				_v32 =  &(_v32[2]);
                                                                      				__rax = _v32;
                                                                      				__eax =  *_v32 & 0x000000ff;
                                                                      				if (( *_v32 & 0x000000ff) == 0) goto 0xbe58a37c;
                                                                      				__rax = _v32;
                                                                      				__eax =  *(__rax + 1) & 0x000000ff;
                                                                      				if (( *(__rax + 1) & 0x000000ff) == 0) goto 0xbe58a37c;
                                                                      				__rax = _v32;
                                                                      				__eax =  *_v32 & 0x000000ff;
                                                                      				_v72 =  *_v32 & 0x000000ff;
                                                                      				goto 0xbe58a33d;
                                                                      				_v72 = _v72 + 1;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rax = _v32;
                                                                      				__eax =  *(__rax + 1) & 0x000000ff;
                                                                      				if (_v72 - ( *(__rax + 1) & 0x000000ff) > 0) goto 0xbe58a37a;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rcx = _a16;
                                                                      				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000004;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rdx = _a16;
                                                                      				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                      				goto 0xbe58a333;
                                                                      				goto 0xbe58a2fe;
                                                                      				_v72 = 1;
                                                                      				goto 0xbe58a390;
                                                                      				_v72 = _v72 + 1;
                                                                      				_v72 = _v72 + 1;
                                                                      				if (_v72 - 0xff >= 0) goto 0xbe58a3c8;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rcx = _a16;
                                                                      				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000008;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rdx = _a16;
                                                                      				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                      				goto 0xbe58a386;
                                                                      				__rax = _a16;
                                                                      				__ecx =  *(_a16 + 4);
                                                                      				__eax = E00007FF87FF8BE58A480( *(_a16 + 4));
                                                                      				__rcx = _a16;
                                                                      				 *(_a16 + 0xc) = __eax;
                                                                      				__rax = _a16;
                                                                      				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                      				goto 0xbe58a403;
                                                                      				__rax = _a16;
                                                                      				 *(__rax + 8) = 0;
                                                                      				_v88 = 0;
                                                                      				goto 0xbe58a417;
                                                                      				_v88 = _v88 + 1;
                                                                      				_v88 = _v88 + 1;
                                                                      				if (_v88 - 6 >= 0) goto 0xbe58a433;
                                                                      				__eax = _v88;
                                                                      				__ecx = 0;
                                                                      				__rdx = _a16;
                                                                      				 *((short*)(_a16 + 0x10 + __rax * 2)) = __cx;
                                                                      				goto 0xbe58a40d;
                                                                      				__rcx = _a16;
                                                                      				__eax = E00007FF87FF8BE58A5E0(_a16); // executed
                                                                      				__eax = 0;
                                                                      				goto 0xbe58a463;
                                                                      				if ( *0xbe5acd68 == 0) goto 0xbe58a45e;
                                                                      				__rcx = _a16;
                                                                      				E00007FF87FF8BE58A4E0(_a16) = 0;
                                                                      				goto 0xbe58a463;
                                                                      				__eax = 0xffffffff;
                                                                      				__rcx = _v24;
                                                                      				__rcx = _v24 ^ __rsp;
                                                                      				return E00007FF87FF8BE583280(0xffffffff, __ecx, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                      			}


















                                                                      0x7ff8be58a000
                                                                      0x7ff8be58a005
                                                                      0x7ff8be58a00d
                                                                      0x7ff8be58a014
                                                                      0x7ff8be58a017
                                                                      0x7ff8be58a028
                                                                      0x7ff8be58a037
                                                                      0x7ff8be58a041
                                                                      0x7ff8be58a048
                                                                      0x7ff8be58a04d
                                                                      0x7ff8be58a05d
                                                                      0x7ff8be58a069
                                                                      0x7ff8be58a073
                                                                      0x7ff8be58a088
                                                                      0x7ff8be58a08e
                                                                      0x7ff8be58a096
                                                                      0x7ff8be58a09e
                                                                      0x7ff8be58a0aa
                                                                      0x7ff8be58a0b8
                                                                      0x7ff8be58a0bd
                                                                      0x7ff8be58a0bf
                                                                      0x7ff8be58a0c7
                                                                      0x7ff8be58a0cf
                                                                      0x7ff8be58a0d8
                                                                      0x7ff8be58a0fc
                                                                      0x7ff8be58a101
                                                                      0x7ff8be58a10c
                                                                      0x7ff8be58a11b
                                                                      0x7ff8be58a128
                                                                      0x7ff8be58a132
                                                                      0x7ff8be58a136
                                                                      0x7ff8be58a13e
                                                                      0x7ff8be58a142
                                                                      0x7ff8be58a14f
                                                                      0x7ff8be58a17f
                                                                      0x7ff8be58a187
                                                                      0x7ff8be58a18b
                                                                      0x7ff8be58a18d
                                                                      0x7ff8be58a192
                                                                      0x7ff8be58a1a6
                                                                      0x7ff8be58a1b1
                                                                      0x7ff8be58a1b8
                                                                      0x7ff8be58a1d0
                                                                      0x7ff8be58a1d3
                                                                      0x7ff8be58a1db
                                                                      0x7ff8be58a1e3
                                                                      0x7ff8be58a1ec
                                                                      0x7ff8be58a200
                                                                      0x7ff8be58a218
                                                                      0x7ff8be58a21e
                                                                      0x7ff8be58a228
                                                                      0x7ff8be58a22f
                                                                      0x7ff8be58a234
                                                                      0x7ff8be58a241
                                                                      0x7ff8be58a24e
                                                                      0x7ff8be58a25b
                                                                      0x7ff8be58a25d
                                                                      0x7ff8be58a265
                                                                      0x7ff8be58a26f
                                                                      0x7ff8be58a271
                                                                      0x7ff8be58a276
                                                                      0x7ff8be58a27b
                                                                      0x7ff8be58a280
                                                                      0x7ff8be58a28f
                                                                      0x7ff8be58a295
                                                                      0x7ff8be58a29d
                                                                      0x7ff8be58a2a3
                                                                      0x7ff8be58a2a5
                                                                      0x7ff8be58a2b1
                                                                      0x7ff8be58a2b3
                                                                      0x7ff8be58a2b7
                                                                      0x7ff8be58a2bf
                                                                      0x7ff8be58a2c4
                                                                      0x7ff8be58a2c6
                                                                      0x7ff8be58a2ce
                                                                      0x7ff8be58a2d5
                                                                      0x7ff8be58a2d8
                                                                      0x7ff8be58a2e0
                                                                      0x7ff8be58a2ec
                                                                      0x7ff8be58a2f2
                                                                      0x7ff8be58a2f7
                                                                      0x7ff8be58a2fc
                                                                      0x7ff8be58a303
                                                                      0x7ff8be58a307
                                                                      0x7ff8be58a30c
                                                                      0x7ff8be58a311
                                                                      0x7ff8be58a316
                                                                      0x7ff8be58a318
                                                                      0x7ff8be58a31d
                                                                      0x7ff8be58a323
                                                                      0x7ff8be58a325
                                                                      0x7ff8be58a32a
                                                                      0x7ff8be58a32d
                                                                      0x7ff8be58a331
                                                                      0x7ff8be58a337
                                                                      0x7ff8be58a339
                                                                      0x7ff8be58a33d
                                                                      0x7ff8be58a342
                                                                      0x7ff8be58a34a
                                                                      0x7ff8be58a350
                                                                      0x7ff8be58a354
                                                                      0x7ff8be58a361
                                                                      0x7ff8be58a368
                                                                      0x7ff8be58a36c
                                                                      0x7ff8be58a374
                                                                      0x7ff8be58a378
                                                                      0x7ff8be58a37a
                                                                      0x7ff8be58a37c
                                                                      0x7ff8be58a384
                                                                      0x7ff8be58a38a
                                                                      0x7ff8be58a38c
                                                                      0x7ff8be58a398
                                                                      0x7ff8be58a39e
                                                                      0x7ff8be58a3a2
                                                                      0x7ff8be58a3af
                                                                      0x7ff8be58a3b6
                                                                      0x7ff8be58a3ba
                                                                      0x7ff8be58a3c2
                                                                      0x7ff8be58a3c6
                                                                      0x7ff8be58a3c8
                                                                      0x7ff8be58a3d0
                                                                      0x7ff8be58a3d3
                                                                      0x7ff8be58a3d8
                                                                      0x7ff8be58a3e0
                                                                      0x7ff8be58a3e3
                                                                      0x7ff8be58a3eb
                                                                      0x7ff8be58a3f2
                                                                      0x7ff8be58a3f4
                                                                      0x7ff8be58a3fc
                                                                      0x7ff8be58a403
                                                                      0x7ff8be58a40b
                                                                      0x7ff8be58a411
                                                                      0x7ff8be58a413
                                                                      0x7ff8be58a41c
                                                                      0x7ff8be58a41e
                                                                      0x7ff8be58a422
                                                                      0x7ff8be58a424
                                                                      0x7ff8be58a42c
                                                                      0x7ff8be58a431
                                                                      0x7ff8be58a433
                                                                      0x7ff8be58a43b
                                                                      0x7ff8be58a440
                                                                      0x7ff8be58a442
                                                                      0x7ff8be58a44b
                                                                      0x7ff8be58a44d
                                                                      0x7ff8be58a45a
                                                                      0x7ff8be58a45c
                                                                      0x7ff8be58a45e
                                                                      0x7ff8be58a463
                                                                      0x7ff8be58a468
                                                                      0x7ff8be58a474

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_
                                                                      • String ID:
                                                                      • API String ID: 1901436342-0
                                                                      • Opcode ID: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                      • Instruction ID: 350caea09f960079d10ae4aabd39b20d31537501ae58893ad220aa9297d968fe
                                                                      • Opcode Fuzzy Hash: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                      • Instruction Fuzzy Hash: E9D10C3261C6818AD7B4CB19E89462AB7A0F788794F409635E7DE8379ADF3CD545CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 62%
                                                                      			E00007FF87FF8BE587540(long long __rax) {
                                                                      				long long _v24;
                                                                      				void* _t8;
                                                                      				void* _t9;
                                                                      
                                                                      				_t16 = __rax;
                                                                      				_t9 = E00007FF87FF8BE583D00(_t8); // executed
                                                                      				_v24 = __rax;
                                                                      				return E00007FF87FF8BE58CF20(E00007FF87FF8BE58CFB0(E00007FF87FF8BE58D450(E00007FF87FF8BE58D470(E00007FF87FF8BE58BD50(E00007FF87FF8BE58AB90(_t9, _v24), _v24), _v24), _v24), _v24), _t16, _v24);
                                                                      			}






                                                                      0x7ff8be587540
                                                                      0x7ff8be587544
                                                                      0x7ff8be587549
                                                                      0x7ff8be58758e

                                                                      APIs
                                                                        • Part of subcall function 00007FF8BE583D00: RtlEncodePointer.NTDLL ref: 00007FF8BE583D06
                                                                      • _initp_misc_winsig.LIBCMTD ref: 00007FF8BE58757B
                                                                      • _initp_eh_hooks.LIBCMTD ref: 00007FF8BE587585
                                                                        • Part of subcall function 00007FF8BE58CF20: EncodePointer.KERNEL32(?,?,?,?,00007FF8BE58758A,?,?,?,?,?,?,00007FF8BE583D39), ref: 00007FF8BE58CF30
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: EncodePointer$_initp_eh_hooks_initp_misc_winsig
                                                                      • String ID:
                                                                      • API String ID: 2678799220-0
                                                                      • Opcode ID: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                                      • Instruction ID: fba2b5c08e3e4f40cb9635d7e5798867ad219f892776b8f5addab3a541995b49
                                                                      • Opcode Fuzzy Hash: abe4bcf42024140c0e82e0fb2c3eff25659a698c9099ae3cd415aa6bcc21eafa
                                                                      • Instruction Fuzzy Hash: D3E0596791D48185E560BB15EC7216A5374BFC47C8F400231F7ED466BBCE1CEA008B41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ExitProcess$AllocateHeap__crt
                                                                      • String ID:
                                                                      • API String ID: 4215626177-0
                                                                      • Opcode ID: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                                      • Instruction ID: d013756ed7578e74b3a56fba119c4ac3cec9d82d7e79a39ca7ffde934a0f71cd
                                                                      • Opcode Fuzzy Hash: 77cc9cc60f8eca6ccffa51c036cc335ce9466cc401fd995fa093edd43c12ab32
                                                                      • Instruction Fuzzy Hash: 50E04F2590C98686E7709719E8213796260FF84388F500135E79E026A7CF2DD440D600
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID: CreateProcess
                                                                      • String ID:
                                                                      • API String ID: 963392458-0
                                                                      • Opcode ID: 04cf030d77e645320339c33741cb4d53f5c8d6a2e25ff01d0d4939bc2732d238
                                                                      • Instruction ID: 2da17281d2a08d1ac9b8a996dbaf27e8716b5e9a88d25284efbd0f172fd1731a
                                                                      • Opcode Fuzzy Hash: 04cf030d77e645320339c33741cb4d53f5c8d6a2e25ff01d0d4939bc2732d238
                                                                      • Instruction Fuzzy Hash: 7041417051CB848FDBB8DF18E48979AB7E0FB88314F104A5DE48EC7245DB749885CB86
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 58%
                                                                      			E00007FF87FF8BE584399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                                      
                                                                      				_a48 = __rax;
                                                                      				if (_a48 == 0) goto 0xbe5843ad;
                                                                      				goto 0xbe5843f5;
                                                                      				if (_a88 != 0) goto 0xbe5843ce;
                                                                      				if (_a120 == 0) goto 0xbe5843c7;
                                                                      				 *_a120 = 0xc;
                                                                      				goto 0xbe5843f5;
                                                                      				if (E00007FF87FF8BE58ABB0(_a48, _a80) != 0) goto 0xbe5843f3;
                                                                      				if (_a120 == 0) goto 0xbe5843ef;
                                                                      				 *_a120 = 0xc;
                                                                      				goto 0xbe5843f5;
                                                                      				goto 0xbe584377;
                                                                      				return 0;
                                                                      			}



                                                                      0x7ff8be584399
                                                                      0x7ff8be5843a4
                                                                      0x7ff8be5843ab
                                                                      0x7ff8be5843b2
                                                                      0x7ff8be5843ba
                                                                      0x7ff8be5843c1
                                                                      0x7ff8be5843cc
                                                                      0x7ff8be5843da
                                                                      0x7ff8be5843e2
                                                                      0x7ff8be5843e9
                                                                      0x7ff8be5843f1
                                                                      0x7ff8be5843f3
                                                                      0x7ff8be5843f9

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                      • Instruction ID: fa6ec6195a64310b6e43543d3c0d30f3a34b01bd4c54d0d10e8a3d4d812a3887
                                                                      • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                      • Instruction Fuzzy Hash: 9D019536A1CB45CAF6608B19E85472EA7A0F7947D4F201135EF9D46BAADF7CE480CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$ByteCharMultiUpdateUpdate::~_Wide
                                                                      • String ID:
                                                                      • API String ID: 2569699860-0
                                                                      • Opcode ID: 0c57b3b436687e78039d68963cfd06a068c3edb785e51800680b91c9a9ce0a07
                                                                      • Instruction ID: 8ae5691fbb8fec8dde30250758b005855c3669498c1f4b2b0429783e4ed72720
                                                                      • Opcode Fuzzy Hash: 0c57b3b436687e78039d68963cfd06a068c3edb785e51800680b91c9a9ce0a07
                                                                      • Instruction Fuzzy Hash: 2501BC72A1C6C08AC760DF15F49069ABBA1F7C9384F60412AEBCD43B5ACB38D504CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _ioterm
                                                                      • String ID:
                                                                      • API String ID: 4163092671-0
                                                                      • Opcode ID: c4661e6c861f00f368b387c53bfc5a2878f93a0c021545087ea26df979c33d88
                                                                      • Instruction ID: 6f4fa863845c52be403dcb3d027fee188bba37a968b7b7e5421367e122a65d94
                                                                      • Opcode Fuzzy Hash: c4661e6c861f00f368b387c53bfc5a2878f93a0c021545087ea26df979c33d88
                                                                      • Instruction Fuzzy Hash: 0DF05F30D4D2068EF662A76C9C793782694AF103D6F502A75E63D811E3DF6CB8458A61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • _ioterm.LIBCMTD ref: 00007FF8BE583437
                                                                        • Part of subcall function 00007FF8BE587D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE58343C), ref: 00007FF8BE587D93
                                                                        • Part of subcall function 00007FF8BE583E00: FlsFree.KERNEL32 ref: 00007FF8BE583E13
                                                                        • Part of subcall function 00007FF8BE583E00: _mtdeletelocks.LIBCMTD ref: 00007FF8BE583E23
                                                                        • Part of subcall function 00007FF8BE5888D0: HeapDestroy.KERNELBASE ref: 00007FF8BE5888DB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                                      • String ID:
                                                                      • API String ID: 1508997487-0
                                                                      • Opcode ID: 8c7cd16c52d3f74447f8a2e4d1e0973512220e22c4a7d0e47614c04d6d0045ae
                                                                      • Instruction ID: dac1471495299f566adcdce9f17121bb133db70b5447fa0d42e6de839fc31a7a
                                                                      • Opcode Fuzzy Hash: 8c7cd16c52d3f74447f8a2e4d1e0973512220e22c4a7d0e47614c04d6d0045ae
                                                                      • Instruction Fuzzy Hash: D0E06770E0C0039EF352A76C9C722B91690AF547C2F801972E32EC62E3EE9DB8004671
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: DestroyHeap
                                                                      • String ID:
                                                                      • API String ID: 2435110975-0
                                                                      • Opcode ID: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                                      • Instruction ID: b681262285c5fcee098a18341c4ca451025cb0eaa63fff4b0023f879d34fb1a5
                                                                      • Opcode Fuzzy Hash: f7b981f9b1b51933cf7e1d9a1baddea90378982ce7575ce50583c327d4fc7a8e
                                                                      • Instruction Fuzzy Hash: 5BC09B78D1DA05C5E7145715FCA532422607B94785FE02030C70D01730CF3E5596C700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: EncodePointer
                                                                      • String ID:
                                                                      • API String ID: 2118026453-0
                                                                      • Opcode ID: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                                      • Instruction ID: ead1cdee8889e52a782a248b5dbd246c9cc38c88b0c422abd447018ef6b4761f
                                                                      • Opcode Fuzzy Hash: 486166b47cec33101184f167bfa082c8d21519f5c79393c344b51e77eb7d9bd4
                                                                      • Instruction Fuzzy Hash: A6A00228F1B595DADA6C373A6CA703A11207F58749FE02879C70F40251CD2D92FE8B04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_snwprintf_s_unlock_wcsftime_l
                                                                      • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $P$Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportW$_itow_s(nLine, szLineMessage, 4096, 10)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcpy_s(szOutMessage2, 4096, "_CrtDbgReport: String too long or Invalid characters in String")$wcscat_s(szLineMessage, 4096, L"\n")$wcscat_s(szLineMessage, 4096, L"\r")$wcscat_s(szLineMessage, 4096, szUserMessage)$wcscpy_s(szLineMessage, 4096, szFormat ? L"Assertion failed: " : L"Assertion failed!")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcscpy_s(szUserMessage, 4096, L"_CrtDbgReport: String too long or IO Error")$wcstombs_s(&ret, szaOutMessage, 4096, szOutMessage, ((size_t)-1))$wcstombs_s(((void *)0), szOutMessage2, 4096, szOutMessage, ((size_t)-1))
                                                                      • API String ID: 4197005980-4190456261
                                                                      • Opcode ID: 91caf2df9a40c10ca931429e5e540051a4e8143577a7dc19426bf0d901356392
                                                                      • Instruction ID: 372811ebc74bf492f4af50f391edb51cd1d7269243218a98d421f5b3070ae0f9
                                                                      • Opcode Fuzzy Hash: 91caf2df9a40c10ca931429e5e540051a4e8143577a7dc19426bf0d901356392
                                                                      • Instruction Fuzzy Hash: 33422A3590CA8689EB30CB18E8643EA73A5FB84384F405636D79E43A99DF7CE549CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Pointer$Decode$AddressEncodeLibraryLoadProc
                                                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                      • API String ID: 2256938910-232180764
                                                                      • Opcode ID: 4136024d25ab454011a9418e3e33b4ea31b56a31dc25d7fc48a91c666a4aba5f
                                                                      • Instruction ID: f7a74ed349f0a3bb25e1af1bbba0106f4c750a1f9289053475b060410dd0fe4e
                                                                      • Opcode Fuzzy Hash: 4136024d25ab454011a9418e3e33b4ea31b56a31dc25d7fc48a91c666a4aba5f
                                                                      • Instruction Fuzzy Hash: E081EA3690DB8689E7609B19FC643AAB3A0FB847D4F501435DB8E42768DF7CE548CB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Client hook re-allocation failure at file %hs line %d.$Client hook re-allocation failure.$Error: memory allocation: bad memory block type.$Error: memory allocation: bad memory block type.Memory allocated at %hs(%d).$Error: possible heap corruption at or near 0x%p$Invalid allocation size: %Iu bytes.$Invalid allocation size: %Iu bytes.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_realloc()$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$_pFirstBlock == pOldBlock$_pLastBlock == pOldBlock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$fRealloc || (!fRealloc && pNewBlock == pOldBlock)$pOldBlock->nLine == IGNORE_LINE && pOldBlock->lRequest == IGNORE_REQ
                                                                      • API String ID: 0-1181733849
                                                                      • Opcode ID: caf568ba67e02e981cee0a62def33bb5426de77b0166e0249518d1aed8fc28ed
                                                                      • Instruction ID: 10c6d3d7d94aabebc2d2406662d4f38e0c5defb51bcbee78b4a99aaddbb431c7
                                                                      • Opcode Fuzzy Hash: caf568ba67e02e981cee0a62def33bb5426de77b0166e0249518d1aed8fc28ed
                                                                      • Instruction Fuzzy Hash: F4421F35A0DB8589EB708B59E86036AB7A5FB847D0F505135DBAD83BA5DF3CE440CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      • pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ, xrefs: 00007FF8BE5857E9
                                                                      • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 00007FF8BE585683
                                                                      • _CrtIsValidHeapPointer(pUserData), xrefs: 00007FF8BE5854E2
                                                                      • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c, xrefs: 00007FF8BE5854F7, 00007FF8BE58556D, 00007FF8BE5857FE
                                                                      • Client hook free failure., xrefs: 00007FF8BE5854A0
                                                                      • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8BE585620
                                                                      • _BLOCK_TYPE_IS_VALID(pHead->nBlockUse), xrefs: 00007FF8BE585558
                                                                      • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8BE58573C
                                                                      • The Block at 0x%p was allocated by aligned routines, use _aligned_free(), xrefs: 00007FF8BE58542B
                                                                      • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 00007FF8BE58579F
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: HeapPointerValid_free_base
                                                                      • String ID: Client hook free failure.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$The Block at 0x%p was allocated by aligned routines, use _aligned_free()$_BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pHead->nLine == IGNORE_LINE && pHead->lRequest == IGNORE_REQ
                                                                      • API String ID: 1656799702-182684663
                                                                      • Opcode ID: 5020832333ec35d85279f4adfeb03ce22c38d55cbbbf155ecd90f9052befc044
                                                                      • Instruction ID: 2bb18fc9896376bb5a6c3d34433e2b81503957b02ab29168572d8860704f1249
                                                                      • Opcode Fuzzy Hash: 5020832333ec35d85279f4adfeb03ce22c38d55cbbbf155ecd90f9052befc044
                                                                      • Instruction Fuzzy Hash: 3CC1653661CB418AEB60CB59E86176AB7A1FB847D0F501536EB9D43BA5EF7CD404CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 00007FF8BE5860C7
                                                                      • _heapchk fails with _HEAPBADPTR., xrefs: 00007FF8BE585D7E
                                                                      • DAMAGED, xrefs: 00007FF8BE585E7D
                                                                      • _heapchk fails with _HEAPBADEND., xrefs: 00007FF8BE585D4D
                                                                      • _1, xrefs: 00007FF8BE5861FC
                                                                      • _heapchk fails with _HEAPBADBEGIN., xrefs: 00007FF8BE585CE5
                                                                      • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed., xrefs: 00007FF8BE5860FA
                                                                      • _heapchk fails with _HEAPBADNODE., xrefs: 00007FF8BE585D19
                                                                      • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 00007FF8BE58617C
                                                                      • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer., xrefs: 00007FF8BE585F42
                                                                      • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8BE585EF9
                                                                      • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8BE585FE7
                                                                      • _heapchk fails with unknown return value!, xrefs: 00007FF8BE585DAF
                                                                      • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer., xrefs: 00007FF8BE586030
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$DAMAGED$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).$_heapchk fails with _HEAPBADBEGIN.$_heapchk fails with _HEAPBADEND.$_heapchk fails with _HEAPBADNODE.$_heapchk fails with _HEAPBADPTR.$_heapchk fails with unknown return value!$_1
                                                                      • API String ID: 0-510578482
                                                                      • Opcode ID: ecaeb8f0e9f50f2af9e26624824c00194ce636c943c5c9e443a2ba6a1604b1b7
                                                                      • Instruction ID: aab620fd1249e815fb408a531b6fa72b67cefef4eea90b6baeb91326d05ef3d3
                                                                      • Opcode Fuzzy Hash: ecaeb8f0e9f50f2af9e26624824c00194ce636c943c5c9e443a2ba6a1604b1b7
                                                                      • Instruction Fuzzy Hash: 5EE17536A1CB458BEB64CB6DE8A162AB7A0FB84794F100535EB9D83B65DF7CD441CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 57%
                                                                      			E00007FF87FF8BE583280(void* __eax, signed int __ecx, signed int __edx, signed int __rcx, signed int __rdx, void* __r8) {
                                                                      				void* _t7;
                                                                      				void* _t10;
                                                                      				signed long long _t15;
                                                                      				signed long long* _t16;
                                                                      				signed long long _t20;
                                                                      				signed long long _t24;
                                                                      
                                                                      				_t7 = __rcx -  *0xbe5ab018; // 0x6e64df9072ef
                                                                      				if (_t7 != 0) goto 0xbe58329a;
                                                                      				asm("dec eax");
                                                                      				if ((__ecx & 0x0000ffff) != 0) goto 0xbe583296;
                                                                      				asm("repe ret");
                                                                      				asm("dec eax");
                                                                      				goto 0xbe583720;
                                                                      				asm("int3");
                                                                      				asm("int3");
                                                                      				asm("int3");
                                                                      				asm("int3");
                                                                      				asm("int3");
                                                                      				asm("int3");
                                                                      				asm("int3");
                                                                      				asm("o16 nop [eax+eax]");
                                                                      				if (__r8 - 8 < 0) goto 0xbe58330c;
                                                                      				_t20 = __rdx * 0x1010101;
                                                                      				_t10 = __r8 - 0x40;
                                                                      				if (_t10 < 0) goto 0xbe5832ee;
                                                                      				_t15 =  ~__rcx;
                                                                      				if (_t10 == 0) goto 0xbe5832de;
                                                                      				 *__rcx = _t20;
                                                                      				_t16 = _t15 + __rcx;
                                                                      				if (_t10 != 0) goto 0xbe583327;
                                                                      				_t24 = __r8 - _t15 & 7;
                                                                      				if (_t10 == 0) goto 0xbe58330c;
                                                                      				 *_t16 = _t20;
                                                                      				if (_t10 != 0) goto 0xbe583300;
                                                                      				if (_t24 == 0) goto 0xbe58331b;
                                                                      				_t16[1] = __edx & 0x000000ff;
                                                                      				if (_t24 - 1 != 0) goto 0xbe583311;
                                                                      				return __eax;
                                                                      			}









                                                                      0x7ff8be583280
                                                                      0x7ff8be583287
                                                                      0x7ff8be583289
                                                                      0x7ff8be583292
                                                                      0x7ff8be583294
                                                                      0x7ff8be583296
                                                                      0x7ff8be58329a
                                                                      0x7ff8be58329f
                                                                      0x7ff8be5832a0
                                                                      0x7ff8be5832a1
                                                                      0x7ff8be5832a2
                                                                      0x7ff8be5832a3
                                                                      0x7ff8be5832a4
                                                                      0x7ff8be5832a5
                                                                      0x7ff8be5832a6
                                                                      0x7ff8be5832b7
                                                                      0x7ff8be5832c6
                                                                      0x7ff8be5832ca
                                                                      0x7ff8be5832ce
                                                                      0x7ff8be5832d0
                                                                      0x7ff8be5832d6
                                                                      0x7ff8be5832db
                                                                      0x7ff8be5832de
                                                                      0x7ff8be5832ec
                                                                      0x7ff8be5832f1
                                                                      0x7ff8be5832f9
                                                                      0x7ff8be583300
                                                                      0x7ff8be58330a
                                                                      0x7ff8be58330f
                                                                      0x7ff8be583311
                                                                      0x7ff8be583319
                                                                      0x7ff8be58331b

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3778485334-0
                                                                      • Opcode ID: b9a945e82b5db3173e30537439e0c8a0a2586c91a17b1594fbe54d080f64dea2
                                                                      • Instruction ID: 0e81ea1eaebfab8d13892f57f9e6bd23aab0decdd15aec3b140de15ced070564
                                                                      • Opcode Fuzzy Hash: b9a945e82b5db3173e30537439e0c8a0a2586c91a17b1594fbe54d080f64dea2
                                                                      • Instruction Fuzzy Hash: 3831E83590CB4689EB609B58FC6436A77A0FB487D5F505036DB9E42B65EF7CE048C700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !f3$/w 8$CZ&B$KE$XW]${H$~V$ehl
                                                                      • API String ID: 0-603092622
                                                                      • Opcode ID: 1ed8f1f3fe5d83a620da9bed02dcbbab86e8a919e24c18f8a00020719e4cb4ac
                                                                      • Instruction ID: cfa183faa2580dac9c87674e45a13d453ed6874265d0529349a04ca9f57a85af
                                                                      • Opcode Fuzzy Hash: 1ed8f1f3fe5d83a620da9bed02dcbbab86e8a919e24c18f8a00020719e4cb4ac
                                                                      • Instruction Fuzzy Hash: 079206752047888BDBB8CF24D8897CE7BE1FB86354F10451DE94E8AA60DBB89744CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _unlock
                                                                      • String ID: Client hook allocation failure at file %hs line %d.$Client hook allocation failure.$Invalid allocation size: %Iu bytes.$_CrtCheckMemory()$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                      • API String ID: 2480363372-3680694803
                                                                      • Opcode ID: 20c9d93c7bd8e5bb28edf4ede7e61cb74df2466a6d8b2339d4d317b1b63016a2
                                                                      • Instruction ID: 15a25f17dbddc5613a684d95d08fe5f9868eeaf36818cd232ea00f07c97eb59b
                                                                      • Opcode Fuzzy Hash: 20c9d93c7bd8e5bb28edf4ede7e61cb74df2466a6d8b2339d4d317b1b63016a2
                                                                      • Instruction Fuzzy Hash: 63510F35A0C6828EE770CB2CEC6576A76A5FB84394F505135DBAD82BA6DF3DE4448B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -~$!X$"98$5%dv$RXrB$}k=$t$t
                                                                      • API String ID: 0-2601355769
                                                                      • Opcode ID: 1ffe31184e489043dfc0ad9b25877cc2ca41a6506ccf0b542c306d1cb23fc7eb
                                                                      • Instruction ID: 40fa059977533c12daa4c197ac7ec32be5dd4a9ad21ad0dd792eee812670dda9
                                                                      • Opcode Fuzzy Hash: 1ffe31184e489043dfc0ad9b25877cc2ca41a6506ccf0b542c306d1cb23fc7eb
                                                                      • Instruction Fuzzy Hash: 4E32F4B1A0578C8BCBB9CF68C8997DD7BF0FB48318F90521DEA099B251CB745A45CB18
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #X$$3$1P$H<,D$I$e$e
                                                                      • API String ID: 0-63615268
                                                                      • Opcode ID: f878a82ca4faae8fe20105a06ae6298662dc00276aeafef1a86afe3292831526
                                                                      • Instruction ID: 84603d17c853973844c2c43058df0d3f37fc759f8199a5ada31f3ca4409f6e56
                                                                      • Opcode Fuzzy Hash: f878a82ca4faae8fe20105a06ae6298662dc00276aeafef1a86afe3292831526
                                                                      • Instruction Fuzzy Hash: 64E2CF715046898BDBF9DF24C88A7DD3BA1BB44344FA0C119E88ECE291DF745A8DEB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $*TG$Ag9$N?$`S$jk7$yHb
                                                                      • API String ID: 0-938425255
                                                                      • Opcode ID: a8480cca88ee067c9f89c24fcf558755f915344c34e6418cf6ef844eb024a60c
                                                                      • Instruction ID: 9f34faa7130dc1dd87f506cddbfe67dee9fd1f9295814769d0e47bce79b2000f
                                                                      • Opcode Fuzzy Hash: a8480cca88ee067c9f89c24fcf558755f915344c34e6418cf6ef844eb024a60c
                                                                      • Instruction Fuzzy Hash: 6D62E371A0530CDFCB59DFA8D18A6DDBBF1FF48344F004119E84AA72A0D7B4991ACB89
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #X$3A<7$B.$Jq^$eIas$p<c$~;-
                                                                      • API String ID: 0-2724674699
                                                                      • Opcode ID: c830ff2e536ec82d4aacd995a299ed7dc96ce275305048a2346641cb28e12bef
                                                                      • Instruction ID: 11eaaa9cd8c54950f626fcd1c6608fbf38bfda5f45ba0fc90d4db62925cbbc4d
                                                                      • Opcode Fuzzy Hash: c830ff2e536ec82d4aacd995a299ed7dc96ce275305048a2346641cb28e12bef
                                                                      • Instruction Fuzzy Hash: 4142EAB090438C8BCBB8DF64C8857DD7BF0FB48308F50852DEA1A9B251DBB05685CB98
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 33%
                                                                      			E00007FF87FF8BE58BE50(intOrPtr __ecx, intOrPtr __edx, void* __edi, void* __esp, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a24) {
                                                                      				intOrPtr _v4;
                                                                      				void* _v12;
                                                                      				signed long long _v24;
                                                                      				signed int _v36;
                                                                      				long long _v180;
                                                                      				long long _v184;
                                                                      				intOrPtr _v192;
                                                                      				char _v196;
                                                                      				intOrPtr _v204;
                                                                      				long _v212;
                                                                      				long long _v220;
                                                                      				long long _v228;
                                                                      				long long _v1212;
                                                                      				long long _v1308;
                                                                      				char _v1460;
                                                                      				char _v1476;
                                                                      				char _v1484;
                                                                      				int _v1492;
                                                                      				long long _v1500;
                                                                      				long long _v1508;
                                                                      				long long _v1516;
                                                                      				long long _v1524;
                                                                      				long long _v1532;
                                                                      				long long _v1540;
                                                                      				void* _t51;
                                                                      				signed long long _t80;
                                                                      				long long _t85;
                                                                      				void* _t100;
                                                                      
                                                                      				_a24 = r8d;
                                                                      				_a16 = __edx;
                                                                      				_a8 = __ecx;
                                                                      				_t80 =  *0xbe5ab018; // 0x6e64df9072ef
                                                                      				_v24 = _t80 ^ _t100 - 0x00000610;
                                                                      				if (_a8 == 0xffffffff) goto 0xbe58be8d;
                                                                      				E00007FF87FF8BE588D90(_t51, _a8);
                                                                      				_v184 = 0;
                                                                      				memset(__edi, 0, 0x94 << 0);
                                                                      				_v1508 =  &_v196;
                                                                      				_v1500 =  &_v1460;
                                                                      				_v1492 = 0;
                                                                      				_v212 = 0;
                                                                      				__imp__RtlCaptureContext();
                                                                      				_t85 = _v1212;
                                                                      				_v220 = _t85;
                                                                      				r8d = 0;
                                                                      				0xbe5a0e28();
                                                                      				_v228 = _t85;
                                                                      				if (_v228 == 0) goto 0xbe58bf64;
                                                                      				_v1516 = 0;
                                                                      				_v1524 =  &_v1476;
                                                                      				_v1532 =  &_v1484;
                                                                      				_v1540 =  &_v1460;
                                                                      				0xbe5a0e22();
                                                                      				goto 0xbe58bf84;
                                                                      				_v1212 = _v12;
                                                                      				_v1308 =  &_v12;
                                                                      				_v196 = _a4;
                                                                      				_v192 = _a12;
                                                                      				_v180 = _v12;
                                                                      				_v1492 = IsDebuggerPresent();
                                                                      				SetUnhandledExceptionFilter(??);
                                                                      				_v212 = UnhandledExceptionFilter(??);
                                                                      				if (_v212 != 0) goto 0xbe58bffb;
                                                                      				if (_v1492 != 0) goto 0xbe58bffb;
                                                                      				if (_v4 == 0xffffffff) goto 0xbe58bffb;
                                                                      				return E00007FF87FF8BE583280(E00007FF87FF8BE588D90(_t59, _v4), _v4, __edx, _v36 ^ _t100 - 0x00000610, _v204, _v220);
                                                                      			}































                                                                      0x7ff8be58be50
                                                                      0x7ff8be58be55
                                                                      0x7ff8be58be59
                                                                      0x7ff8be58be65
                                                                      0x7ff8be58be6f
                                                                      0x7ff8be58be7f
                                                                      0x7ff8be58be88
                                                                      0x7ff8be58be8d
                                                                      0x7ff8be58beaa
                                                                      0x7ff8be58beb4
                                                                      0x7ff8be58bebe
                                                                      0x7ff8be58bec3
                                                                      0x7ff8be58becb
                                                                      0x7ff8be58bedb
                                                                      0x7ff8be58bee1
                                                                      0x7ff8be58bee9
                                                                      0x7ff8be58bef1
                                                                      0x7ff8be58bf04
                                                                      0x7ff8be58bf09
                                                                      0x7ff8be58bf1a
                                                                      0x7ff8be58bf1c
                                                                      0x7ff8be58bf2a
                                                                      0x7ff8be58bf34
                                                                      0x7ff8be58bf3e
                                                                      0x7ff8be58bf5d
                                                                      0x7ff8be58bf62
                                                                      0x7ff8be58bf6c
                                                                      0x7ff8be58bf7c
                                                                      0x7ff8be58bf8b
                                                                      0x7ff8be58bf99
                                                                      0x7ff8be58bfa8
                                                                      0x7ff8be58bfb6
                                                                      0x7ff8be58bfbc
                                                                      0x7ff8be58bfcd
                                                                      0x7ff8be58bfdc
                                                                      0x7ff8be58bfe3
                                                                      0x7ff8be58bfed
                                                                      0x7ff8be58c013

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                                      • Instruction ID: 70bf2cc8af9cc929fb33e985b69a95c72e462faf6356619ef94dd4c7a7bf53d0
                                                                      • Opcode Fuzzy Hash: 3c99f19865488fa949415da8e2229a8dc4eaaacedc1a65a8015e4c0ea1d70d8e
                                                                      • Instruction Fuzzy Hash: 3C41DE3651CFC58AE6708B18F8643ABB3A5F788395F401229D69D42BA9EF3DC495CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                      • String ID:
                                                                      • API String ID: 1445889803-0
                                                                      • Opcode ID: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                                      • Instruction ID: 9c0c4a1d271bc8c04cc0be49d09359c24ce176c74619878f9661922ecdb381cf
                                                                      • Opcode Fuzzy Hash: 3c45f80db2f34b613ab4c9fa771cbb066be9ba5f1b7e4cdc55cd1e9c18cefb40
                                                                      • Instruction Fuzzy Hash: A821C82560DF0589DA708B09FC6422A77E0FB8CBE4F441235EADD87B64EE3CD2948740
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Fg$UE;~$ibq$X$o
                                                                      • API String ID: 0-4038568857
                                                                      • Opcode ID: 478ae4c756925d4c0df58bf132ef81c61d708642842f5bb4a6db73d18922ca94
                                                                      • Instruction ID: c65d31d342ee38981127283826f07a965cef744f0e08d64225b30ad95669dc15
                                                                      • Opcode Fuzzy Hash: 478ae4c756925d4c0df58bf132ef81c61d708642842f5bb4a6db73d18922ca94
                                                                      • Instruction Fuzzy Hash: B0A2E9B1E0470C9FCB59CFA8E48A6DEBBF2FB48344F004119E906B7251D7B49919CB99
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !g$!g$-{e$.9Y$7cm
                                                                      • API String ID: 0-3613756181
                                                                      • Opcode ID: 8466a7fe0396b74cedb6887ba44c1057051f2a552123ac4d034c792a786adc4e
                                                                      • Instruction ID: bf5508b14f48093895fd1996fdb0e85e6185e8dd26636c64e6a2ba956b5e503a
                                                                      • Opcode Fuzzy Hash: 8466a7fe0396b74cedb6887ba44c1057051f2a552123ac4d034c792a786adc4e
                                                                      • Instruction Fuzzy Hash: 409231711483CB8BCB78CF54C845BEEBBE1FB84704F10852CE86A8BA51E7B49649DB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Ol$`P$i($km}&$ttR
                                                                      • API String ID: 0-1254889785
                                                                      • Opcode ID: 9493bf0160dfff7cf218a8f761ba212010c51dc1cc37675f8f08f25cb4825c85
                                                                      • Instruction ID: 987162bd0b035dc474e6baf50d73a519649db35efcc54d1c771acda0ad58d409
                                                                      • Opcode Fuzzy Hash: 9493bf0160dfff7cf218a8f761ba212010c51dc1cc37675f8f08f25cb4825c85
                                                                      • Instruction Fuzzy Hash: 57422870908B488FD769CF79C48965EBBF1FB88748F204A1DE6A297271DB709845CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: &JS$T'$T'$t7"$wHM
                                                                      • API String ID: 0-3882947952
                                                                      • Opcode ID: e1efb4f73683d5eb84ec2e51f9646df27f06f31a7415d6bac1a400d419ecf411
                                                                      • Instruction ID: 5dfe4264b2e9e46270ab4916ee937e41ce96fb3ef9e59635e1bc08d1b7ce1cf5
                                                                      • Opcode Fuzzy Hash: e1efb4f73683d5eb84ec2e51f9646df27f06f31a7415d6bac1a400d419ecf411
                                                                      • Instruction Fuzzy Hash: C6C1E3B150464DDFCB98CF28D1856DA7BE0FF48318F41822AFC0A9B264D774DA68DB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 2T$=+%2$]|m$.s$9=
                                                                      • API String ID: 0-2491194820
                                                                      • Opcode ID: cf9153d85b611db8c4e34f9d3970acb18e39f17aceac1e5b04446b1241c988c8
                                                                      • Instruction ID: b22ad84dfc9a36729601f04a7d34ea20b01e779292d252d1f9b28ced5abbce67
                                                                      • Opcode Fuzzy Hash: cf9153d85b611db8c4e34f9d3970acb18e39f17aceac1e5b04446b1241c988c8
                                                                      • Instruction Fuzzy Hash: AE911570D0978C8FDB99DFE8D046BDEBBB2EB15348F40412DE44AAB298D774550ACB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <jG$PXf$]V.$fE$2>
                                                                      • API String ID: 0-2974598014
                                                                      • Opcode ID: bad49f1636925e4aa97c527113884a17b5682b6c71c0135986e4f76ada5c5575
                                                                      • Instruction ID: 93145a700ffc0e4eb939e50d890ad0ed9c26548b847d798d32bc26a6146f6c62
                                                                      • Opcode Fuzzy Hash: bad49f1636925e4aa97c527113884a17b5682b6c71c0135986e4f76ada5c5575
                                                                      • Instruction Fuzzy Hash: 3FA1E9716097C88FDBBADF68C84A7CB7BE4FB49704F50461DD88A8A250CBB45649CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -$<yH$`Zx$i,$i,
                                                                      • API String ID: 0-409805761
                                                                      • Opcode ID: f6182156d312c6874ac13020d1629895101c3b27d9b9d95c05b51086f9e303f4
                                                                      • Instruction ID: e265554e7eca7cf7370185f19b3f513919126148552d798dab9d7d185450bf95
                                                                      • Opcode Fuzzy Hash: f6182156d312c6874ac13020d1629895101c3b27d9b9d95c05b51086f9e303f4
                                                                      • Instruction Fuzzy Hash: 1F511D70E0470ECFCB59CFA8D4956EFBBB6EB44384F00816DD406A6290DB749B59CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: G$B$f F$p1
                                                                      • API String ID: 0-995880848
                                                                      • Opcode ID: f106650fdab1d10f8436c7cd336edd67fd48273b3da7da9a68bf46945136c829
                                                                      • Instruction ID: e5e766d75efbf2695ddd79b534cb997516972fc828d7cc42ecf8557e6a546d15
                                                                      • Opcode Fuzzy Hash: f106650fdab1d10f8436c7cd336edd67fd48273b3da7da9a68bf46945136c829
                                                                      • Instruction Fuzzy Hash: F972F87058478A8FDBB8DF24C8857EF7BA2FB84304F11852DE89A8B250DBB59655CF01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <!b$[2\$q+|k$qz;
                                                                      • API String ID: 0-4125875841
                                                                      • Opcode ID: 4b7cb7bbd3893869e40255ef41bc2512a7308139999d5a55f5be408d5e599cf0
                                                                      • Instruction ID: a542c4577bd7c2caf4f59e22e2006f44d15bdd166a7528eec1f5ff4567d3e676
                                                                      • Opcode Fuzzy Hash: 4b7cb7bbd3893869e40255ef41bc2512a7308139999d5a55f5be408d5e599cf0
                                                                      • Instruction Fuzzy Hash: 883234716187448FC769DF68C58A65EBBF0FB86744F10891DF6868B2A0C7B2D809CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: &$5RX$WE0$\h]
                                                                      • API String ID: 0-3485045178
                                                                      • Opcode ID: 03a43095a46f3f61d774493bb922c9041777d8e7f6728b8083ed9e1489c990f2
                                                                      • Instruction ID: bcdd786ba30a02497e69aa8425991a4f00e6ab9cdb2a577162cf86c9936701da
                                                                      • Opcode Fuzzy Hash: 03a43095a46f3f61d774493bb922c9041777d8e7f6728b8083ed9e1489c990f2
                                                                      • Instruction Fuzzy Hash: 4502E4705187C88BD794DFA8C48A69FFBE1FB94744F104A1DF486862A0DBF4D949CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: A1$A1$\)$v8
                                                                      • API String ID: 0-2822171287
                                                                      • Opcode ID: 392d2325a62e3d43b495978243ee00a583b670d5214b1fd2fb6c21b80fcb7928
                                                                      • Instruction ID: 6e847e787c057b57acc1c354f394c9b4082fee365cea8ba22b71c11ea9ebc013
                                                                      • Opcode Fuzzy Hash: 392d2325a62e3d43b495978243ee00a583b670d5214b1fd2fb6c21b80fcb7928
                                                                      • Instruction Fuzzy Hash: 40F1EF71904348DBCF9CDF68C88A6DE7FA1FF48394FA05129FA4697250C7759989CB80
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: *ECV$;.$;.$pv>&
                                                                      • API String ID: 0-2557916696
                                                                      • Opcode ID: 4cb81f83a04ef04c4b0be031f68b033a83f7e38034b852111fd97ec7dec363fa
                                                                      • Instruction ID: 7999f9c4935295cc2aa309186ca72e602cbe03928e3ff34651e0e21172d74868
                                                                      • Opcode Fuzzy Hash: 4cb81f83a04ef04c4b0be031f68b033a83f7e38034b852111fd97ec7dec363fa
                                                                      • Instruction Fuzzy Hash: 52F1C0B0505609DFCB98CF28C599ADA7BE0FF48348F41812EFC4A9B260D774DA68DB45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Hwn$NR'$$fkD$}gK
                                                                      • API String ID: 0-1908897248
                                                                      • Opcode ID: a42200c2a405048015f864ccfe9f3e227c0945315cfa0ff0bef3f4c816ba0cee
                                                                      • Instruction ID: b3495f7b3258c7cfbbaf34d24a151d9f74cd673a76d708f913f7006ffd896b9d
                                                                      • Opcode Fuzzy Hash: a42200c2a405048015f864ccfe9f3e227c0945315cfa0ff0bef3f4c816ba0cee
                                                                      • Instruction Fuzzy Hash: 4AE1E6701083C8CBDBFADF64C889BDA7BACFB44708F105519EA0A9E258DB745789CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !vT$3P$?gs $Y^u
                                                                      • API String ID: 0-3532888945
                                                                      • Opcode ID: b61af7194893f8c82987b2510d64685971d92872f6245166d2af23a9bb7efed9
                                                                      • Instruction ID: a130400614884e80b8bc041bf9d1a61bd98fb93a976fe1395b57ea9810b4de45
                                                                      • Opcode Fuzzy Hash: b61af7194893f8c82987b2510d64685971d92872f6245166d2af23a9bb7efed9
                                                                      • Instruction Fuzzy Hash: 72C1207160170DCBDBA8CF28C18A6CE3BE5FF48354F104129FC1A9A261D7B4EA59DB45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -,$7k A$k$2s
                                                                      • API String ID: 0-3102563331
                                                                      • Opcode ID: 21b97ee769df899699db8ec55527806a56553d5edd7851697391367575400d1c
                                                                      • Instruction ID: bac349e1162b647475c44c7bb34b04b6f4b8289c4e67fa9b2355cb93066e8c6e
                                                                      • Opcode Fuzzy Hash: 21b97ee769df899699db8ec55527806a56553d5edd7851697391367575400d1c
                                                                      • Instruction Fuzzy Hash: 36C1387151074D9BCF89DF28C88A5DD3BB1FB48398F566219FC4AA6260C7B4D584CF84
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 76N$Ho<$]}$s5xe
                                                                      • API String ID: 0-3382501871
                                                                      • Opcode ID: 48f959005062580ac36a5c68606ec558c6a5f2e613880a1e5b76a83967194bde
                                                                      • Instruction ID: 0065c1d241d3448e2397ca8c0fa5a5365e82301828f7e764778ef267285b4530
                                                                      • Opcode Fuzzy Hash: 48f959005062580ac36a5c68606ec558c6a5f2e613880a1e5b76a83967194bde
                                                                      • Instruction Fuzzy Hash: 47A1E171504349CFCB95DF28C089ACA7BE0FF58308F42562AFC49A7255D774DAA8CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <~]$@:$]U$]U
                                                                      • API String ID: 0-740249671
                                                                      • Opcode ID: f6acb40b154dde8fa3df42201c69f340e4f140856c7e7667b8c968f76e5b3c44
                                                                      • Instruction ID: 93bbccedb30105693727df547a8ee70240eea560fa1b67170d45bbd81435be64
                                                                      • Opcode Fuzzy Hash: f6acb40b154dde8fa3df42201c69f340e4f140856c7e7667b8c968f76e5b3c44
                                                                      • Instruction Fuzzy Hash: BC81387450660DCFDB69DF68D0867EE77F2FB24344F204029E815DA2A2D774CA19CB8A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      • %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d)., xrefs: 00007FF8BE58617C
                                                                      • HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d)., xrefs: 00007FF8BE5860C7
                                                                      • HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8BE585EF9
                                                                      • HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d)., xrefs: 00007FF8BE585FE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %hs located at 0x%p is %Iu bytes long.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: after %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory after end of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: before %hs block (#%d) at 0x%p.CRT detected that the application wrote to memory before start of heap buffer.Memory allocated at %hs(%d).$HEAP CORRUPTION DETECTED: on top of Free block at 0x%p.CRT detected that the application wrote to a heap buffer that was freed.Memory allocated at %hs(%d).
                                                                      • API String ID: 0-1867057952
                                                                      • Opcode ID: ea889a4d0a0d63da2a4932dba4f80fda51d0f679e8992708aed7b5cf259d3687
                                                                      • Instruction ID: 98c0676b826730e3ac10501166be8568a9113a3b682d607bbf4500f576737422
                                                                      • Opcode Fuzzy Hash: ea889a4d0a0d63da2a4932dba4f80fda51d0f679e8992708aed7b5cf259d3687
                                                                      • Instruction Fuzzy Hash: AF811D3661CB458ADB64CB59E8A032AB7A0F7C8794F100536EB9D87BA5DFBDD441CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: U!t$)$o}$q
                                                                      • API String ID: 0-3686089749
                                                                      • Opcode ID: bf0474be6c6ce2e48f6d2d7926dbfb2caa288b201239c410f95da0c70b98d83b
                                                                      • Instruction ID: 504cee08a43b26f7e4edd141fcc1dad3608ee18550f5ec8ccdea89eebec808be
                                                                      • Opcode Fuzzy Hash: bf0474be6c6ce2e48f6d2d7926dbfb2caa288b201239c410f95da0c70b98d83b
                                                                      • Instruction Fuzzy Hash: 74918CB190030E8FCB48CF68D58A5DE7FB1FB68398F204219F85696254D77496A5CFC4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4<$4<$Hhr$J;}
                                                                      • API String ID: 0-2050331814
                                                                      • Opcode ID: c5a04ea52945682b476d42612895679d50d29c6124b176cb0c2b711214be2d9b
                                                                      • Instruction ID: 3d3ba58424421bda00612f90d71964148b60402fac749f980543760ede98840e
                                                                      • Opcode Fuzzy Hash: c5a04ea52945682b476d42612895679d50d29c6124b176cb0c2b711214be2d9b
                                                                      • Instruction Fuzzy Hash: 7461F4B0615648DFDF58DF68C08A69A7BA1FB48354F00C12EFC1ADB294DB70DA58CB45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ;$;$eQ%$_
                                                                      • API String ID: 0-1753937898
                                                                      • Opcode ID: afea0fbc1d0f044595d14710a3cdc41d7bc72a212051bdcef0ffdf3ac8c4ab3c
                                                                      • Instruction ID: 3574068fecf093fcbc9a635d24f3027655c33c427b378eb3a0ef079df85d540d
                                                                      • Opcode Fuzzy Hash: afea0fbc1d0f044595d14710a3cdc41d7bc72a212051bdcef0ffdf3ac8c4ab3c
                                                                      • Instruction Fuzzy Hash: 868137705003CCABDBFACF28CC997D93BA0FB49354F50822AE94A8E250DF745B499B40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: :U$<;?:${(${(
                                                                      • API String ID: 0-1086306767
                                                                      • Opcode ID: adfd1542a6b862dcbbf80cb55e1091ef2c2665d1724c34312d1a81eba162a757
                                                                      • Instruction ID: ff3a3435717f4ead1b58fb824901535bd9cf299cdf9a7bd1c813f3606ded2d6e
                                                                      • Opcode Fuzzy Hash: adfd1542a6b862dcbbf80cb55e1091ef2c2665d1724c34312d1a81eba162a757
                                                                      • Instruction Fuzzy Hash: 0861E0705187848BD768CF28C18965FBBF0FB8A748F10891EF68686260D7B6D948CB03
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Oh$h<$t010$|N.
                                                                      • API String ID: 0-2324740333
                                                                      • Opcode ID: 35c0cfe6136cac06300efd424f395a2521218bc7fc47dd603edd05c4400a0958
                                                                      • Instruction ID: 16379aaf1bb4413e0c13418f9d8c18c2bc98b7e827952bd0a9b5f9990c6c03cf
                                                                      • Opcode Fuzzy Hash: 35c0cfe6136cac06300efd424f395a2521218bc7fc47dd603edd05c4400a0958
                                                                      • Instruction Fuzzy Hash: E051B1B090034A8BCF48DF68D48A4DE7FB1FB58398F60461DE85AAA250D37496A4CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: GW$V{mu$dF
                                                                      • API String ID: 0-3399639152
                                                                      • Opcode ID: 13f3ce258387fdab81722341723304c211862b24c4b90673b1ab6d5c48b56b4d
                                                                      • Instruction ID: 5d4924119bb90987b6c65e27c55bf51887eeb75551c0c0a5c8140b5b1edb0396
                                                                      • Opcode Fuzzy Hash: 13f3ce258387fdab81722341723304c211862b24c4b90673b1ab6d5c48b56b4d
                                                                      • Instruction Fuzzy Hash: B8F13F71508B888FD7B9CF28D48969EBBF0FB84744F20461EE5A59B270DBB49645CF02
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K:$]w($n S$
                                                                      • API String ID: 0-3322466707
                                                                      • Opcode ID: c1684008171d4e306236772ac743a7b0f928483c20fc59153bd471c66e400ccf
                                                                      • Instruction ID: e698a885d6bb162bf0ff3cac371d937558b4210aa05752a6266eb715b4493fc4
                                                                      • Opcode Fuzzy Hash: c1684008171d4e306236772ac743a7b0f928483c20fc59153bd471c66e400ccf
                                                                      • Instruction Fuzzy Hash: 94F11570D047588BDBA8DFA8C88A6DDBBF0FB48304F60821DD85AAB251DB749949DF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $L+$S'$$o%
                                                                      • API String ID: 0-4100028055
                                                                      • Opcode ID: 9fd258a3895b4d268f32f05a4a2d93e51bad250bed430a342084c072b36ef08c
                                                                      • Instruction ID: 179b9f87c3a4f9e214743648708db8209e3d71a45a824f016a1577c5ed2144a1
                                                                      • Opcode Fuzzy Hash: 9fd258a3895b4d268f32f05a4a2d93e51bad250bed430a342084c072b36ef08c
                                                                      • Instruction Fuzzy Hash: 34F1DFB1504609DFCB98DF28C0896DE7BE0FB58358F41812AFC4A9B264D770DA68DB45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 47T]$K_j$is[
                                                                      • API String ID: 0-2699472077
                                                                      • Opcode ID: f40290fddc4da9899e50fb62f60591b1b1e6ff44cb1495cdff8c692982a81ea2
                                                                      • Instruction ID: 6016c1221021197edd7f817fb9cbd09fcb5ac8bbf6c5f54f5697c1ffe249b4d0
                                                                      • Opcode Fuzzy Hash: f40290fddc4da9899e50fb62f60591b1b1e6ff44cb1495cdff8c692982a81ea2
                                                                      • Instruction Fuzzy Hash: 2CD127719047CD8FCF99CFA8C88A6EE7BB1FB48344F50821DE80697651C7B4990ACB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: B+=$Mt$[4
                                                                      • API String ID: 0-935141491
                                                                      • Opcode ID: a60433d87628b4dd05d8c24f82dcc33c98af1bb7bb81019966b8dd8b9453b802
                                                                      • Instruction ID: bf1f234f614a92c8f0daef92778263c373ce788cc2d228a45e1a9745d38385ec
                                                                      • Opcode Fuzzy Hash: a60433d87628b4dd05d8c24f82dcc33c98af1bb7bb81019966b8dd8b9453b802
                                                                      • Instruction Fuzzy Hash: 36F1D470505B888FDBB9DF24CC897EB7BA0FB94316F10551EE84A9A290DFB49648CF41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $c7$@%?5$b3
                                                                      • API String ID: 0-1970763919
                                                                      • Opcode ID: 9dd9411ae2ae8fe50429bce004b52f82e822d73dcaf286881c61fffa8cd320f1
                                                                      • Instruction ID: 7544b270a4a1d87a4c453583f66bfc56a0d33d7204b7a287ddb0882fb61d0d22
                                                                      • Opcode Fuzzy Hash: 9dd9411ae2ae8fe50429bce004b52f82e822d73dcaf286881c61fffa8cd320f1
                                                                      • Instruction Fuzzy Hash: 48E158B5902748CFCB88DF68C69A59D7BF1FF59308F404029FC1A9A264D7B4D928CB49
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #^$`]$%
                                                                      • API String ID: 0-102912427
                                                                      • Opcode ID: ca2120b3b73aeab9747ebd3a80ee073ee8f7bbd66699a0431753568d5f85675a
                                                                      • Instruction ID: 878e7741f870b7fe1bc6c0f4a33361fdae8fd10665ac772b8c524eb0937c225a
                                                                      • Opcode Fuzzy Hash: ca2120b3b73aeab9747ebd3a80ee073ee8f7bbd66699a0431753568d5f85675a
                                                                      • Instruction Fuzzy Hash: FDB1277090474D8FCF48CF68C88A6DE7BF0FB48398F165219E85AA6250D778D549CF89
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: EQp$JK8[$kU
                                                                      • API String ID: 0-1401246002
                                                                      • Opcode ID: f6e783ca98e508b57d8889390bb84d83c8a7c59b34dd19a79ab41ed993f4136f
                                                                      • Instruction ID: 75ff6837d11cf9dd0609e11c9b8f3cf17f900585419d92be27056132c399e7dd
                                                                      • Opcode Fuzzy Hash: f6e783ca98e508b57d8889390bb84d83c8a7c59b34dd19a79ab41ed993f4136f
                                                                      • Instruction Fuzzy Hash: 2EB1587190474DCBCF88CF68C48A6DE7BF0FB58358F165219E94AA6260C778D584CF89
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: /@=`$h$zJ
                                                                      • API String ID: 0-1145068787
                                                                      • Opcode ID: 058fb21ebd37bd9eb3c247c823e69362e4f90846d4c9b1e02e85b924af49b442
                                                                      • Instruction ID: efaff62c6dea5b666cd0ec5e1287633bd35f75f1b854ced8b25ae11fb6165d3c
                                                                      • Opcode Fuzzy Hash: 058fb21ebd37bd9eb3c247c823e69362e4f90846d4c9b1e02e85b924af49b442
                                                                      • Instruction Fuzzy Hash: 74A12F70608B4C8BEB9ADF18C4857DD7BF1FB49384F508559F84A86292CB34DA49CB86
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $g$>6$nB
                                                                      • API String ID: 0-1868063892
                                                                      • Opcode ID: ff2a3d7c641745ffb25121b662fa46cfa0900d035ad6a59b85364cfb369e7909
                                                                      • Instruction ID: 5ef365e91c1d80a07604eb41db5a1b86f6ebf61e3d7968a3749ade557fb4125b
                                                                      • Opcode Fuzzy Hash: ff2a3d7c641745ffb25121b662fa46cfa0900d035ad6a59b85364cfb369e7909
                                                                      • Instruction Fuzzy Hash: 7CB121705193849FC7A9CF68C58569EBBF0FB88744F906A1DF8868B260D7B4DA44CF42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #\9$Vj+&$M
                                                                      • API String ID: 0-3658199817
                                                                      • Opcode ID: b54fe4db0c482ebc48653361818c1ec5b550a7c5ec628dbf807c67c5d3739686
                                                                      • Instruction ID: 26c1b974044aa0bae0d49f3ac843ec2fe1acc35572613d15cd803358aab69238
                                                                      • Opcode Fuzzy Hash: b54fe4db0c482ebc48653361818c1ec5b550a7c5ec628dbf807c67c5d3739686
                                                                      • Instruction Fuzzy Hash: FEA144709147098FCB48CFA8D88A5DEBBF0FB48318F11421DE89AB7250D778A945CF99
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #X$d,U$d3
                                                                      • API String ID: 0-3246363944
                                                                      • Opcode ID: b19347f6a86a0bef7f71d8365dac67f13c927bf2e0e4be2ddf998f75a428a595
                                                                      • Instruction ID: e67d37b33042bdc2b75ebe9cceb0670a2214c716ea8b8408a91d9fe0cb16ea97
                                                                      • Opcode Fuzzy Hash: b19347f6a86a0bef7f71d8365dac67f13c927bf2e0e4be2ddf998f75a428a595
                                                                      • Instruction Fuzzy Hash: 84C1F9715093C8CBDBBEDF64C885BDA3BA9FB44708F10521DEA0A9E258CB745749CB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: X9T[$Y)~$Zo
                                                                      • API String ID: 0-3816472334
                                                                      • Opcode ID: 4d45b44019f37ffc6e1bc3352b37dca48114cbe71f71f11aaeec7abd6044a81e
                                                                      • Instruction ID: 74daf22561f986eaee31dd2e877d7e0390ad28e8a973cc345c4d359d4462c4de
                                                                      • Opcode Fuzzy Hash: 4d45b44019f37ffc6e1bc3352b37dca48114cbe71f71f11aaeec7abd6044a81e
                                                                      • Instruction Fuzzy Hash: A8A17CB5A02749CBCF48DF68C29A59D7BF1BF49304F408129FC1A9A360E3B5E525CB49
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: HR$HR$K)
                                                                      • API String ID: 0-1226256413
                                                                      • Opcode ID: fe1a1f4cc53af174484b1611b8e08b9bf30ae67f3885f7bd771c709debbd063f
                                                                      • Instruction ID: e79f82d9c1651787cdde5b7f69db4956d02e0856481d2681396fdc662c453c95
                                                                      • Opcode Fuzzy Hash: fe1a1f4cc53af174484b1611b8e08b9bf30ae67f3885f7bd771c709debbd063f
                                                                      • Instruction Fuzzy Hash: 7B511971A08B0D8FDB58DFE8C4856EEBBF1FB48354F004119E81AB72A4C7749A09CB95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ]u$"$:;
                                                                      • API String ID: 0-2021956800
                                                                      • Opcode ID: e5b729e8d3ca91e6ffaa64c5216b9ad0038ed08cda9d2019842c7aa3bd36f9ee
                                                                      • Instruction ID: 26b28f3a503e825e1842dbf9688ebde44fe9506c1339f803b7779101942ae612
                                                                      • Opcode Fuzzy Hash: e5b729e8d3ca91e6ffaa64c5216b9ad0038ed08cda9d2019842c7aa3bd36f9ee
                                                                      • Instruction Fuzzy Hash: A4619CB490438E8FCB48DF68C88A5CE7BB0FB48758F104A19EC26A7250D3B49664CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: :/$MX-$p/{
                                                                      • API String ID: 0-4131788469
                                                                      • Opcode ID: dafbc4e7fc6d693899884ed9ed99f384ad96a46aea59d1081574b489c0c87a57
                                                                      • Instruction ID: 300bb33d5e72857c277ccbf4b656446e283825a036a8781aa3fd7c6b43312ff2
                                                                      • Opcode Fuzzy Hash: dafbc4e7fc6d693899884ed9ed99f384ad96a46aea59d1081574b489c0c87a57
                                                                      • Instruction Fuzzy Hash: A451CFB181034E8FCB48CF68C49A9DEBFB0FB58358F104619E816A6260D3B496A4CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #X$^'$r]I
                                                                      • API String ID: 0-2222137400
                                                                      • Opcode ID: 6c7560d6808315bae7f49c2fb11faa3634dddad0bf829aa3411576f4b5dc867d
                                                                      • Instruction ID: 3b6e37f17289f863f41b4cc43218ba669218828eb13bdfb79aac3f5d198efd30
                                                                      • Opcode Fuzzy Hash: 6c7560d6808315bae7f49c2fb11faa3634dddad0bf829aa3411576f4b5dc867d
                                                                      • Instruction Fuzzy Hash: 363117B15087C48BD75DDFA8C49A21EFBE1BB84344F508A1DF5828A760D7F4D548CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: @$T3$$w4
                                                                      • API String ID: 0-2021144935
                                                                      • Opcode ID: bc7dc22fb94c9f236bd87286f30cded165edce72f2f8fa2203197d10143a9bcc
                                                                      • Instruction ID: b7ecb3d52509d16e0b7106ebb5b87557e4c245f613a26780fe6ea3dbe1bda8ab
                                                                      • Opcode Fuzzy Hash: bc7dc22fb94c9f236bd87286f30cded165edce72f2f8fa2203197d10143a9bcc
                                                                      • Instruction Fuzzy Hash: 2C31B1B452C781AFC788DF28C49981EBBE1FB88314F806A1CF8C68B354D7799815CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: fuQ$z2[
                                                                      • API String ID: 0-2289383304
                                                                      • Opcode ID: 441494ec0c86c783de8318a42c6139c52bb1bde3da6283a2c639beb8e2f65b2f
                                                                      • Instruction ID: 6dbb2b06e415c8f3afbcfc152abca8622b4e8fcbe683a1ba83f0e2cb341d8d2f
                                                                      • Opcode Fuzzy Hash: 441494ec0c86c783de8318a42c6139c52bb1bde3da6283a2c639beb8e2f65b2f
                                                                      • Instruction Fuzzy Hash: 3EE11E7150670CCBDB68CF38C58A69D7BE1FF54348F205129EC1A9B262D770E929CB49
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: :C$kR[
                                                                      • API String ID: 0-2209222604
                                                                      • Opcode ID: 11a29c0ca78bb61b91ac56aed3bc2f39647a1b65c88feb917197daf0b3f95e80
                                                                      • Instruction ID: 7c9a6a6b3faeb9776e3b10aef600c10835f2b607fd00d40f7bdfdfd53dfcb9a1
                                                                      • Opcode Fuzzy Hash: 11a29c0ca78bb61b91ac56aed3bc2f39647a1b65c88feb917197daf0b3f95e80
                                                                      • Instruction Fuzzy Hash: 90D13870A4470C8FDB99DFA8D04A7DDBBF2FB48344F108119E80AAF295C7B49949CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: U/a$b*I
                                                                      • API String ID: 0-148379327
                                                                      • Opcode ID: 5fd17e9242f9f83aee3c84d8a49cb22fc0f07f7b85d6bf0c23bfb3783ccf2aec
                                                                      • Instruction ID: 7d254379c67d49f8dc4f025a9255c0c47b4989c88be3dfa38f92a25c6632ea03
                                                                      • Opcode Fuzzy Hash: 5fd17e9242f9f83aee3c84d8a49cb22fc0f07f7b85d6bf0c23bfb3783ccf2aec
                                                                      • Instruction Fuzzy Hash: 28D10B7150024E8BCB59CF68C88A6DE3FB0FB18398F155219FC5AA7250D7B8D698CBC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Jl$aijA
                                                                      • API String ID: 0-1592139677
                                                                      • Opcode ID: 63e2519535c0a0a06864801ebef0b78a9df6d39fc0654acb9b8633e279544aec
                                                                      • Instruction ID: 7b4029e1b0f4c6d16455640de175402024ed69906be1bf35ac226dba8d49acae
                                                                      • Opcode Fuzzy Hash: 63e2519535c0a0a06864801ebef0b78a9df6d39fc0654acb9b8633e279544aec
                                                                      • Instruction Fuzzy Hash: 4AC1217111474CCFDBA9CF28C59A6DA3BE8FF48344F10412AFC5A86261C774EA58CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: E!X$aT
                                                                      • API String ID: 0-1608121357
                                                                      • Opcode ID: 6891fb2d6db3071f9b84c44756173137ff7b28830fe573994ee80e512644894e
                                                                      • Instruction ID: 4d019785a6b4256ed0cfe79ca05195ecf0bf4926bcad1b682180c0cba5e5cf4f
                                                                      • Opcode Fuzzy Hash: 6891fb2d6db3071f9b84c44756173137ff7b28830fe573994ee80e512644894e
                                                                      • Instruction Fuzzy Hash: 16B12770E0470ECFCB99DFE8C4556EFB7B6FB58388F0081599806A6290DB748719CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: i6$5t
                                                                      • API String ID: 0-3127670231
                                                                      • Opcode ID: a253027af394429a069129eb83cd81c4fb0c40bb542b60a20d2aa22b5b78e39c
                                                                      • Instruction ID: 343c37a285082c0d22a0c6c838fe19bbba7b54ff6f1f952ba2714c32cb406723
                                                                      • Opcode Fuzzy Hash: a253027af394429a069129eb83cd81c4fb0c40bb542b60a20d2aa22b5b78e39c
                                                                      • Instruction Fuzzy Hash: B6A1E270D087188FDB69DFB9C88A69DBBF0FB48708F20821DD856A7252DB749949CF41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: t3Z$r'
                                                                      • API String ID: 0-3247238830
                                                                      • Opcode ID: 45187aede304d4735527529db4b0bfe1669f1d2749ba8206633b0fe433a295e4
                                                                      • Instruction ID: 1d29c97d450220819c0ed5b60dd6ff5608267f61915941bb22285759947d3464
                                                                      • Opcode Fuzzy Hash: 45187aede304d4735527529db4b0bfe1669f1d2749ba8206633b0fe433a295e4
                                                                      • Instruction Fuzzy Hash: 74A1EC706057CC9FEBB9DF24C8897DE7BA0FB4A344F50461DE88A8E260DB745649CB02
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: N}V$jt
                                                                      • API String ID: 0-2926509837
                                                                      • Opcode ID: b049d5321a5d0b8b2c35b06077383899f8fb99c1ca51b799598ed477ff688beb
                                                                      • Instruction ID: 5d852b2b0b88ea82dc6b1cd0fb1e099f39aebf29041bab94b5a0a50aabd496dc
                                                                      • Opcode Fuzzy Hash: b049d5321a5d0b8b2c35b06077383899f8fb99c1ca51b799598ed477ff688beb
                                                                      • Instruction Fuzzy Hash: 64A148B990628CDFCB98DFA8C5CA58D7BB1FF44308F00411AFC169A256D7B4D629CB49
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: |I$}r/
                                                                      • API String ID: 0-4123960085
                                                                      • Opcode ID: a5b20f145e2128ebb590cd3c49dff006a35873bd4209483889af058205fdcd1a
                                                                      • Instruction ID: 800e601dd46cbb9d9738628f52141beaff35432bc8d4d1bcfb76f59376750d80
                                                                      • Opcode Fuzzy Hash: a5b20f145e2128ebb590cd3c49dff006a35873bd4209483889af058205fdcd1a
                                                                      • Instruction Fuzzy Hash: 2981F2711047888BDBB9CF28C88A7DA7BA1FB95348F50C219D88ECE261DF75564DDB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Fd7$T;
                                                                      • API String ID: 0-1040651304
                                                                      • Opcode ID: 7f0199fa78f26e8ae3d4cfff6d4ba3547f4bc3c86668e4528162529d3c3e3bb8
                                                                      • Instruction ID: 7ffd56a0096037782dccd6a22a1dfddd73a4019a8d8d07411bfc7024195b5d88
                                                                      • Opcode Fuzzy Hash: 7f0199fa78f26e8ae3d4cfff6d4ba3547f4bc3c86668e4528162529d3c3e3bb8
                                                                      • Instruction Fuzzy Hash: 8071E47051074D9FCB89CF24C8C9ADA7FB1FB483A8FA56218FC0696255C774D989CB84
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: bep$o1S[
                                                                      • API String ID: 0-985821681
                                                                      • Opcode ID: c77bf9ac064369e7680d63b20ce0fc89bb0b2606aa702be6d1acaa4fa6638a8c
                                                                      • Instruction ID: 91a209abfe7e4aeb1d81c4716095da0dca5975d88cd9946800e077bcf0a455c5
                                                                      • Opcode Fuzzy Hash: c77bf9ac064369e7680d63b20ce0fc89bb0b2606aa702be6d1acaa4fa6638a8c
                                                                      • Instruction Fuzzy Hash: C2513A70A0830D8FDB68DFA8C4456EEB7F2FB58358F004519E44AEB290DB349A19CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: _6#$u<
                                                                      • API String ID: 0-4076860791
                                                                      • Opcode ID: 98c419b77e8ba2554e3faf170cbc78b74b026a1788d9e59b3cc1785a688e6d9f
                                                                      • Instruction ID: 493e3a016aefd0e8f5cec56f814c132ed6dac505d4b0458c18be2d4878a88dba
                                                                      • Opcode Fuzzy Hash: 98c419b77e8ba2554e3faf170cbc78b74b026a1788d9e59b3cc1785a688e6d9f
                                                                      • Instruction Fuzzy Hash: D451C0B190070A8BCB48CF68C4965DE7FB1FB68394F24422DE856A6350D3749AA5CFD4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Nz$Nz
                                                                      • API String ID: 0-3618188535
                                                                      • Opcode ID: f1f9fac336b8da8ff6122659e216f65e6467f6a7eb6b837c99e1b7255e82ae59
                                                                      • Instruction ID: b98bb35d41bec71e3509b0825005519e10211f24d4dcfaaa5e415a9a600f37b2
                                                                      • Opcode Fuzzy Hash: f1f9fac336b8da8ff6122659e216f65e6467f6a7eb6b837c99e1b7255e82ae59
                                                                      • Instruction Fuzzy Hash: 7761D97060478C9FDBB9CF54D8857DE3AA1FB46344F60851AA88E8A250CFB45788CB43
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 10W$ra"
                                                                      • API String ID: 0-3432184507
                                                                      • Opcode ID: fd02e9085198f1ee23cd325c43483fe701dbbe4b729f3c21db55c4e968cbf284
                                                                      • Instruction ID: 1603a0fb70214c4199dc1879cc592ce20ce94242888b692f3a5634201c3c6fcf
                                                                      • Opcode Fuzzy Hash: fd02e9085198f1ee23cd325c43483fe701dbbe4b729f3c21db55c4e968cbf284
                                                                      • Instruction Fuzzy Hash: 215106B1D0070E8BCF48DFA5C48A5EEBFB1FB58358F218109E815A6260D7B49695CFC4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Dm"i$e
                                                                      • API String ID: 0-579088429
                                                                      • Opcode ID: 1da592fe1c5b87024080557b40311a255aea64fd983cac56dc8e0bfd413ff1a3
                                                                      • Instruction ID: ff289f4c4decf21b808411560f97a6ae0bbfde48fa9fd21a36285b9362365cbb
                                                                      • Opcode Fuzzy Hash: 1da592fe1c5b87024080557b40311a255aea64fd983cac56dc8e0bfd413ff1a3
                                                                      • Instruction Fuzzy Hash: 1251A1B180038ECFCF88CF68D8865CE7BB0FF58358F105A19E865A6260D3B49664CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: . 9$j~F
                                                                      • API String ID: 0-3982525500
                                                                      • Opcode ID: 8e27ed3e49b3a332b1e9bdfaf9f41fe9f17daf01a485ce033b7626c7aaf20959
                                                                      • Instruction ID: 73f587e096f547b5323f36eeea6c902c11c99e62676f2e49b342c8d806439c0b
                                                                      • Opcode Fuzzy Hash: 8e27ed3e49b3a332b1e9bdfaf9f41fe9f17daf01a485ce033b7626c7aaf20959
                                                                      • Instruction Fuzzy Hash: C951E3B190034A8FCF48CF68C5864EE7FB1FB58398F50461DE85AAA250D37896A4CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <>$u_"
                                                                      • API String ID: 0-3712044913
                                                                      • Opcode ID: 54a7279f070d6e0e1cb936a4c41fbfa7e6deebc7b08f576cf545ddb7c45c5dbd
                                                                      • Instruction ID: 00705162336351badf1f89c020232bf89398a1e9550ad3a4c6adce9a79b90856
                                                                      • Opcode Fuzzy Hash: 54a7279f070d6e0e1cb936a4c41fbfa7e6deebc7b08f576cf545ddb7c45c5dbd
                                                                      • Instruction Fuzzy Hash: FC51BFB090034E8FCB48CF69D48A5DE7FB1FB58398F104619E856AA250D37496A8CBC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 7M$kJz
                                                                      • API String ID: 0-1286445197
                                                                      • Opcode ID: 98bdb79501751698457a0c63b58abd008b0bb4ffe469ed6aba7912a1c6e09250
                                                                      • Instruction ID: 73e64fa095a73a4e7c26ce88557ae34d60ddb43780546a58e46c5e1049f230da
                                                                      • Opcode Fuzzy Hash: 98bdb79501751698457a0c63b58abd008b0bb4ffe469ed6aba7912a1c6e09250
                                                                      • Instruction Fuzzy Hash: E441D5B180034E9FCB48CF68D48A5DEBFB0FB58398F118619F815AA260D7B49694CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: NKi$gJk
                                                                      • API String ID: 0-746334108
                                                                      • Opcode ID: 58a5bce911c0f09ef1344d541f8e13db5683852ad3f58203c0096be295061b76
                                                                      • Instruction ID: 370847f9a3576a2127be3913012de96f7d2fcf003f6ba5f8aec55f91b5c1372d
                                                                      • Opcode Fuzzy Hash: 58a5bce911c0f09ef1344d541f8e13db5683852ad3f58203c0096be295061b76
                                                                      • Instruction Fuzzy Hash: AD41C3B091034A8FCB48CF68C48A5DE7FF0FB28398F104619E815A6250D37496A8CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 97"$lND
                                                                      • API String ID: 0-255837067
                                                                      • Opcode ID: 9f2144797edb960c4800540d43b86211ccc900e5f41a7482899803b998be048c
                                                                      • Instruction ID: fdd228a39bc21f447827aa5875072745b1c1c90cd936de3499e4094daaa9051d
                                                                      • Opcode Fuzzy Hash: 9f2144797edb960c4800540d43b86211ccc900e5f41a7482899803b998be048c
                                                                      • Instruction Fuzzy Hash: 2F41D4B080038E8FCB48CFA8D8865DE7BF0FB48358F504609E86AA6250D7B49665CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <\$P
                                                                      • API String ID: 0-3329260309
                                                                      • Opcode ID: 58da91c3c3294d218300734e2334eac2d42de78c76df722d29d8bba67d1a0edb
                                                                      • Instruction ID: 7a6472800a972813acd2230f771f615073e8df7510407cf225569f4894f6b0d7
                                                                      • Opcode Fuzzy Hash: 58da91c3c3294d218300734e2334eac2d42de78c76df722d29d8bba67d1a0edb
                                                                      • Instruction Fuzzy Hash: AC41A2B181034DCFDB44CF68C88A5DE7FF0FB58358F104619E869A6250D7B89698CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: &Z];$j,
                                                                      • API String ID: 0-1323350831
                                                                      • Opcode ID: 0816880f4d87a32c826b6eaf935fab6bcbeafe9302e1cf1b19fce18330a9178f
                                                                      • Instruction ID: 4d52acf51d445db6beda3a26974f1176594abf5478927dcbf805cd9d8e8fa18c
                                                                      • Opcode Fuzzy Hash: 0816880f4d87a32c826b6eaf935fab6bcbeafe9302e1cf1b19fce18330a9178f
                                                                      • Instruction Fuzzy Hash: 9F31DEB190074E8BCF48DF24C88A1DE3BA1FB28798F50461DFC5696250D7B4D6A4CBC4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 'd=$Y6C
                                                                      • API String ID: 0-2002142494
                                                                      • Opcode ID: fd35d43619dc3a263a01b5f940063c5335a5c98091513a5ed1770b6a4388dd96
                                                                      • Instruction ID: ccf6aaa63b1aa8c6b30d000549e8006a3e599278b8e3fc9790a4e3cb01e02506
                                                                      • Opcode Fuzzy Hash: fd35d43619dc3a263a01b5f940063c5335a5c98091513a5ed1770b6a4388dd96
                                                                      • Instruction Fuzzy Hash: 744191B190034E9FCB44CFA8D48A5DEBFF0FB58398F205619E81AA6250D3B49694CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 27A$Cm)X
                                                                      • API String ID: 0-3608389941
                                                                      • Opcode ID: e0490a94f28e6ce23732593848f5f9e9112bddaf8c3b402d699b48d1b456956c
                                                                      • Instruction ID: 684b918ddde8746cffb287e87a4350d0062747792986074a3c358ea6f2ed809a
                                                                      • Opcode Fuzzy Hash: e0490a94f28e6ce23732593848f5f9e9112bddaf8c3b402d699b48d1b456956c
                                                                      • Instruction Fuzzy Hash: 15316FB46187848B8348DF28D59551ABBE5FBCC308F404B2DF4CAAB360D778D644CB4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ?oCf$Wu
                                                                      • API String ID: 0-2445847193
                                                                      • Opcode ID: b07007c7df8fdcff1a3a12132ff18166943f80f753e521aa0974c7cb649c130d
                                                                      • Instruction ID: 6e752a1dbd70b7d88cda0fb1d20915d08c65693f2945daa64a17bfbf07288bfe
                                                                      • Opcode Fuzzy Hash: b07007c7df8fdcff1a3a12132ff18166943f80f753e521aa0974c7cb649c130d
                                                                      • Instruction Fuzzy Hash: 5E21AEB55187848B83489F28C44A41ABBE0FB8C70DF504B2DF8DAA6260D778D646CB4B
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0F6 $KO
                                                                      • API String ID: 0-276686719
                                                                      • Opcode ID: 6205ceb11bb6b662748add8c297f1b443fa17d6724776aa75fc58f5dae511f0b
                                                                      • Instruction ID: 15a0bfab9284e0424f8d805b4637dfad6d31782236c6d70db9798c35a47a8228
                                                                      • Opcode Fuzzy Hash: 6205ceb11bb6b662748add8c297f1b443fa17d6724776aa75fc58f5dae511f0b
                                                                      • Instruction Fuzzy Hash: AB21AD755283808FC368DF68C58614BBBF0FB86748F504A1DFAC686261D7B6D805CB47
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: p$tSA
                                                                      • API String ID: 0-3551818358
                                                                      • Opcode ID: 99011765d78b2b4d15352d42fcf875ddc55d3d35c100f7abdde6317782da955f
                                                                      • Instruction ID: dafa682f426fd7c4027cc0dc28289443c8a7082daafb3c1476061bf3b97c4e55
                                                                      • Opcode Fuzzy Hash: 99011765d78b2b4d15352d42fcf875ddc55d3d35c100f7abdde6317782da955f
                                                                      • Instruction Fuzzy Hash: 4A2169B45183858BD788DF28C54A50BBBE0BBCD74CF400B2DF4CAA6260D378D644CB4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8r.F$P?
                                                                      • API String ID: 0-1060054278
                                                                      • Opcode ID: 69901aac6ce1aef3d4959f7919bc5ecc16501e8ce7d01dbb2ce958a2c67dc727
                                                                      • Instruction ID: b2da1e8a0f89ffdbcd525e428a91df6a678b185604bab408c7dee67f2374b2b0
                                                                      • Opcode Fuzzy Hash: 69901aac6ce1aef3d4959f7919bc5ecc16501e8ce7d01dbb2ce958a2c67dc727
                                                                      • Instruction Fuzzy Hash: DC2179B45187849BC749DF68D44A41ABBE0BB9C71CF800B5DF4CAAA310D3B8D645CB4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: <>
                                                                      • API String ID: 0-1927776135
                                                                      • Opcode ID: 37c3f39876e999beb0937df684067ca5812f0cda9578e561258942df6de8421c
                                                                      • Instruction ID: 9b9c084f2c1b1f08cb5858c99f1f27cbdd47ca95557f3058ff07422eb4e47033
                                                                      • Opcode Fuzzy Hash: 37c3f39876e999beb0937df684067ca5812f0cda9578e561258942df6de8421c
                                                                      • Instruction Fuzzy Hash: F742047190438C9BDBB9CFA8D8CA6DD7BB0FB58314F20421DD80A9B261DB745A85CF85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: j=
                                                                      • API String ID: 0-592141216
                                                                      • Opcode ID: 1169f1869d3fb428bfdad968f94ee3f32c89471e58a558a0d80dd63f76afa428
                                                                      • Instruction ID: 9003355423bafd58b5275d98cfc2247977288ca0e37ad1cbcdd73f3390e5cf1b
                                                                      • Opcode Fuzzy Hash: 1169f1869d3fb428bfdad968f94ee3f32c89471e58a558a0d80dd63f76afa428
                                                                      • Instruction Fuzzy Hash: 6BD1397150074D8BDF89DF28C89A6DE3BA0FB58398F55522CFC4AA6250C778D998CBC4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: !O
                                                                      • API String ID: 0-2378650393
                                                                      • Opcode ID: 302dfdcfbb7bb296299c3bc274bc73d8feb87790668f515a7c841834ed93dc2b
                                                                      • Instruction ID: 4170ec84c9d3f49002394f5178db7bb3edfe66952fd3c2890134f0e6da5031b0
                                                                      • Opcode Fuzzy Hash: 302dfdcfbb7bb296299c3bc274bc73d8feb87790668f515a7c841834ed93dc2b
                                                                      • Instruction Fuzzy Hash: F2E10A711087C88BDBFADF64C88ABDE3BACFB44748F105519EA0A9E258CB745748CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ^Lu
                                                                      • API String ID: 0-3854589714
                                                                      • Opcode ID: fb3768cccb7a26f6a89fbcd18e8308750f02c0f1f73e9d8b382492f454794486
                                                                      • Instruction ID: 7c859a126a25bd0c02bef77f14247f717a5a9adcaacfb9e6f8c6730b8303fd88
                                                                      • Opcode Fuzzy Hash: fb3768cccb7a26f6a89fbcd18e8308750f02c0f1f73e9d8b382492f454794486
                                                                      • Instruction Fuzzy Hash: E4A128709047498FCB9DCF68C88A6EEBBF1FF48384F204119EA46A7250D7759A85CB81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Z"
                                                                      • API String ID: 0-1896177830
                                                                      • Opcode ID: 85f6676341921d6f483625aa17b45c04f6466e2be55beb334fa49e51010a1540
                                                                      • Instruction ID: 91163448777d7afc4cc80e296cb9cfbd8772b1902329242c75d45222aab24025
                                                                      • Opcode Fuzzy Hash: 85f6676341921d6f483625aa17b45c04f6466e2be55beb334fa49e51010a1540
                                                                      • Instruction Fuzzy Hash: C0A165B590060DCFCBA8CF78D15A68E7BF1BB04308F606129EC269A262E774D619CF50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: e8f2
                                                                      • API String ID: 0-4239716772
                                                                      • Opcode ID: 3907476c53bac25a555e3ffc467f8b6ad850bf32927a98fe31c8bf9de770097f
                                                                      • Instruction ID: aaec5001b0b3f576b33a9a86a913a78c3f9fdfa8ed470970e8cb6047951b043a
                                                                      • Opcode Fuzzy Hash: 3907476c53bac25a555e3ffc467f8b6ad850bf32927a98fe31c8bf9de770097f
                                                                      • Instruction Fuzzy Hash: C491C37010078E8BDF49DF24D89A5DA3BA1FB58348F114618FC5A97294C7B8EA65CBC4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Qhm
                                                                      • API String ID: 0-202924511
                                                                      • Opcode ID: a2bb8b1411107b7575902c6661116fd2ce5bfac275bcbff6451e16fcd58631a3
                                                                      • Instruction ID: dff427aa29f5729145b0ab8b996757c093157db28b416262619acb8c77b37c14
                                                                      • Opcode Fuzzy Hash: a2bb8b1411107b7575902c6661116fd2ce5bfac275bcbff6451e16fcd58631a3
                                                                      • Instruction Fuzzy Hash: 1D511479517209CBCB69CF38D4D56E93BE0EF68344F20012DFC668B2A2DB70D5268B48
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: WZ'
                                                                      • API String ID: 0-1944904082
                                                                      • Opcode ID: 8b55f411d49b287bdfafef9dc47725f2bb274e5ab4be629ead2bc2b735d307b3
                                                                      • Instruction ID: 5b5aaaf1f09ca5557c90149fa64bb16396cbc43774f49a57b3b09e68a9cf408c
                                                                      • Opcode Fuzzy Hash: 8b55f411d49b287bdfafef9dc47725f2bb274e5ab4be629ead2bc2b735d307b3
                                                                      • Instruction Fuzzy Hash: F171087155878CDBDBBADF28C8897D937B1FB98304F908219D80E8E254DB785B4ACB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: -]
                                                                      • API String ID: 0-3195032325
                                                                      • Opcode ID: 2f387ab0a9f756c6099ceefcc45306d74e879ef7c324eb87884d154b92a960fc
                                                                      • Instruction ID: 01c3c27378e714c100c9a801295078fc99e5b088b1ed4129002e73aaaa485763
                                                                      • Opcode Fuzzy Hash: 2f387ab0a9f756c6099ceefcc45306d74e879ef7c324eb87884d154b92a960fc
                                                                      • Instruction Fuzzy Hash: 0151297010064D8BCB49DF28D4855D93FE1FB0C3ACF1A6318FD4AAA251D774D989CB88
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: }4}
                                                                      • API String ID: 0-922147943
                                                                      • Opcode ID: 13f685bfa53c13813d4a1c5d0eb0e1f62a0b1129b8c138172dc2148ffb4c9b25
                                                                      • Instruction ID: d7790a4c64fa8f9a696ea70ce14f4ff71b76161c227bc6b72ade158e86aff98b
                                                                      • Opcode Fuzzy Hash: 13f685bfa53c13813d4a1c5d0eb0e1f62a0b1129b8c138172dc2148ffb4c9b25
                                                                      • Instruction Fuzzy Hash: 3461F2B090075D8FCF48DFA4C88A5EEBBB0FB18348F114219E849B6250D7789A09CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: J_H
                                                                      • API String ID: 0-3345504573
                                                                      • Opcode ID: 917d428dc0055415592351f28073fdc95282f2729562562c1ca0dc8b4505919e
                                                                      • Instruction ID: 228b1474463df3943694e07488ce24e2c321c70e95dbe7fca5aca48057557888
                                                                      • Opcode Fuzzy Hash: 917d428dc0055415592351f28073fdc95282f2729562562c1ca0dc8b4505919e
                                                                      • Instruction Fuzzy Hash: EE71E3B1904789CBDBB9DFA4C8896DDBBB0FB48344F20421EDC5AAB251DBB45685CF01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 6p
                                                                      • API String ID: 0-4149211260
                                                                      • Opcode ID: 2ce6c019f8e175d8f04f96ba0abbac2df009c59e7d0a66d8d52c33c4e2d2dbc2
                                                                      • Instruction ID: 4bbd446beaef8e149afb4be24994101fb76057089ac3c5e28d57a25dd33f9813
                                                                      • Opcode Fuzzy Hash: 2ce6c019f8e175d8f04f96ba0abbac2df009c59e7d0a66d8d52c33c4e2d2dbc2
                                                                      • Instruction Fuzzy Hash: 5D512670D0470E8FDBA5CFA4C4863EEBBF0FB58344F208519E155B6251C7789A498BD6
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: o-b
                                                                      • API String ID: 0-1062997908
                                                                      • Opcode ID: 576a5f5008345344db0b8e3d8b9e4c65842e933aac756182c5b50859cc037c1c
                                                                      • Instruction ID: 42124e7df8dcd8895505725edc86312d8ed31e4959f5f45477de907a66349d68
                                                                      • Opcode Fuzzy Hash: 576a5f5008345344db0b8e3d8b9e4c65842e933aac756182c5b50859cc037c1c
                                                                      • Instruction Fuzzy Hash: 5951177050064D8BDB94DF58C48A6DE3BE0FB28398F254219FC4AA6250D7789699CBC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: >(O
                                                                      • API String ID: 0-1787487011
                                                                      • Opcode ID: b44782859c9866ecf0a367f2980fc160796e99ead2e04d39a5c7d0e6a088d4a1
                                                                      • Instruction ID: 047403745ffdf525a43130cb5f0cbada7355141308e198c8a6f422d75d1d2ed5
                                                                      • Opcode Fuzzy Hash: b44782859c9866ecf0a367f2980fc160796e99ead2e04d39a5c7d0e6a088d4a1
                                                                      • Instruction Fuzzy Hash: FB51D0B090078A8BCF4CDF64C8964EE7BB1FB48344F418A1DE966A6350D3B49665CFD4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8:*
                                                                      • API String ID: 0-724269717
                                                                      • Opcode ID: e3fa9c188720ae3383b8778e69c2785bb5a3de525a41bd4bbc95f284b45543ac
                                                                      • Instruction ID: 711009871b2250b35f00fe0553413368f045348530dbac453829dc2cbdd56c12
                                                                      • Opcode Fuzzy Hash: e3fa9c188720ae3383b8778e69c2785bb5a3de525a41bd4bbc95f284b45543ac
                                                                      • Instruction Fuzzy Hash: DE519FB491074A8FCF48CF68D48A4DEBFB0FB68398F604519EC56AA250D37496A4CFD4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: rX
                                                                      • API String ID: 0-981687150
                                                                      • Opcode ID: 72326b85271c7a937057e165988be4f12753e05fcac8eb4b8ea4e21389b64c69
                                                                      • Instruction ID: b6d69565f821f61997a80366e3bba675c41573294b632c1fc230c031640afc4a
                                                                      • Opcode Fuzzy Hash: 72326b85271c7a937057e165988be4f12753e05fcac8eb4b8ea4e21389b64c69
                                                                      • Instruction Fuzzy Hash: 4151AFB090034E9FCB88CF64D48A5DE7FF0FB68398F204619E856A6250D7B496A5CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Mf_
                                                                      • API String ID: 0-1332758469
                                                                      • Opcode ID: fb88f28924fad9aaa6151cff677ca0e0efdf4f904b7a048c95071875f4937966
                                                                      • Instruction ID: 588ebf95624ee4adfb38f08f1f8e1a2e631849e2b9196c961bccb52f3d8eb30d
                                                                      • Opcode Fuzzy Hash: fb88f28924fad9aaa6151cff677ca0e0efdf4f904b7a048c95071875f4937966
                                                                      • Instruction Fuzzy Hash: 72413A7051034E8BDB49DF24C88A6DE3FA0FB28388F254619FC4AA6250D774DA99CBC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: #X
                                                                      • API String ID: 0-1684620495
                                                                      • Opcode ID: 95d6dfd1a906a0706b046fd694ee3460552bea9bfe9cb5e2a40ac0cd4b690da8
                                                                      • Instruction ID: f9643209bdbdb1888c2e59a9774da8228396ec72f530c9748c2220c9be6d5877
                                                                      • Opcode Fuzzy Hash: 95d6dfd1a906a0706b046fd694ee3460552bea9bfe9cb5e2a40ac0cd4b690da8
                                                                      • Instruction Fuzzy Hash: BC41B2B050C3858BC368DF69D49A51BFFF0FB8A344F104A1DF68686660D7B6D985CB06
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: *ZP
                                                                      • API String ID: 0-3785686542
                                                                      • Opcode ID: 124ec41d44a3523d05a66609c609173a78c4b3624f4a4e6496b4e9e6556fc9cc
                                                                      • Instruction ID: cd700ac0e72fdea100a6c678007ea8a5747de393b09cc95ae15ed8a735d2c9a6
                                                                      • Opcode Fuzzy Hash: 124ec41d44a3523d05a66609c609173a78c4b3624f4a4e6496b4e9e6556fc9cc
                                                                      • Instruction Fuzzy Hash: C351A3B490038EDFCB89CF64D88A5CE7BB0FB14358F104A19F826A6260D7B49665CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: m9
                                                                      • API String ID: 0-3356931199
                                                                      • Opcode ID: 59db1ee33f63e0a2717973542dec2f5b5e1c1c898ff6bc1b3de0a09d2022d082
                                                                      • Instruction ID: d52339509a2a8a66acc38e501e73e88f1da459d23edb33c529fdb618239225c9
                                                                      • Opcode Fuzzy Hash: 59db1ee33f63e0a2717973542dec2f5b5e1c1c898ff6bc1b3de0a09d2022d082
                                                                      • Instruction Fuzzy Hash: AC41DFB091074E8BDB48CF68C48A5DE7FF0FB58388F24821DE816A6250D3B496A4CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4pI
                                                                      • API String ID: 0-4229698716
                                                                      • Opcode ID: 2de104f479e2b2f02d24493f8855e4bc5dcdc9c63e6a51756a92895ab6f7f3eb
                                                                      • Instruction ID: 0770ca01e568b3f0bfe5184ab77212d0ab800e579d58ef6f76929ab8cb5ebb0d
                                                                      • Opcode Fuzzy Hash: 2de104f479e2b2f02d24493f8855e4bc5dcdc9c63e6a51756a92895ab6f7f3eb
                                                                      • Instruction Fuzzy Hash: 2741F4B190074E8BCF48CFA8C89A5DE7FB0FB58358F10561DE826A6250D3B49658CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: T7
                                                                      • API String ID: 0-2187045315
                                                                      • Opcode ID: 5b373cdcbe2aa1956c24a8ef4c3b2010382917b3ef4417ae897a4905ea2e7e5d
                                                                      • Instruction ID: e445a35d468e15d444dcf9e81ad6d1cbfbebd9662ebae466ae50992912f39bd9
                                                                      • Opcode Fuzzy Hash: 5b373cdcbe2aa1956c24a8ef4c3b2010382917b3ef4417ae897a4905ea2e7e5d
                                                                      • Instruction Fuzzy Hash: 6B41E3B191074A8BCF48CF68C48A4DE7FB0FF68398F214609E856A6250D3B496A5CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Y[
                                                                      • API String ID: 0-1945238269
                                                                      • Opcode ID: 31c1f4254bc290cabebbeaadf273c7758becd057e90036f86d7834daa6438d30
                                                                      • Instruction ID: 277041adf1a083522e20f1ff56a0db14356653c4c70dd43ccf4c86f47916e8c3
                                                                      • Opcode Fuzzy Hash: 31c1f4254bc290cabebbeaadf273c7758becd057e90036f86d7834daa6438d30
                                                                      • Instruction Fuzzy Hash: C941E67091038E8FCB48DF68C88A5DE7BB1FB58358F10461DEC6AAB250D3B49664CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: [
                                                                      • API String ID: 0-784033777
                                                                      • Opcode ID: 593e2affadbd7d43363044155888d79a97a338ed63d972069ddab33477027861
                                                                      • Instruction ID: 430e1a122fe0b20a7e1e6f195b5c5d6ab4e3c741a825a8fe397d5d7cdac5a180
                                                                      • Opcode Fuzzy Hash: 593e2affadbd7d43363044155888d79a97a338ed63d972069ddab33477027861
                                                                      • Instruction Fuzzy Hash: 2841E4B090074E8BCB48CF64C89A4EE7FF1FB68358F11461DE856A6250D3B496A5CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 9 m
                                                                      • API String ID: 0-1920745034
                                                                      • Opcode ID: 403251bbe0303adcdb9fc718cab8a153fac6736b8b0f21ecfcc0465734d374f6
                                                                      • Instruction ID: 3be0e43e89224af25a3a96d245761afcbfad2e5132df1735d4859c98edb6e384
                                                                      • Opcode Fuzzy Hash: 403251bbe0303adcdb9fc718cab8a153fac6736b8b0f21ecfcc0465734d374f6
                                                                      • Instruction Fuzzy Hash: 5D41A6B180038ECFCB48CF68C88A5DE7FB1FB58358F114A19F869A6210D7B49665CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: wo0
                                                                      • API String ID: 0-1782833155
                                                                      • Opcode ID: 915272897a82389ccaff6fb74a1b6d3f763f551119c92165f64424d72f92453c
                                                                      • Instruction ID: 9062cfcdbd96f40b118b25d613ee2554a2eb62b456f013d12e1abcba11dd4c76
                                                                      • Opcode Fuzzy Hash: 915272897a82389ccaff6fb74a1b6d3f763f551119c92165f64424d72f92453c
                                                                      • Instruction Fuzzy Hash: AD4104B090034E8BCB48CF68C4865DE7FB0FB48358F11861DE85AAA250D7749664CFC4
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 0FT
                                                                      • API String ID: 0-3306264968
                                                                      • Opcode ID: 221a7c3e7820f489f33ab0bfd813c90db956588b7e3f278aa32cbc5897504973
                                                                      • Instruction ID: 6bc0069c9e8fc616ccef226ca938112ebcbb35ca2f33a2ab28ad344b092e513b
                                                                      • Opcode Fuzzy Hash: 221a7c3e7820f489f33ab0bfd813c90db956588b7e3f278aa32cbc5897504973
                                                                      • Instruction Fuzzy Hash: 30419FB090078E8FCB49CF64C88A5DE7BB0FB18358F104A19E866A7250D7B8D665CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: [Mh<
                                                                      • API String ID: 0-3342980100
                                                                      • Opcode ID: 8db4eb38f9ab2c3bc7d36487ff8b598b8cd98b11ddd9dbc7aed51384deea61bf
                                                                      • Instruction ID: 3dfa530075d16dbdc0ab74c4fd592fdc9016efe2b3d8749faa49a3b984689735
                                                                      • Opcode Fuzzy Hash: 8db4eb38f9ab2c3bc7d36487ff8b598b8cd98b11ddd9dbc7aed51384deea61bf
                                                                      • Instruction Fuzzy Hash: 3D41B4B090034E8BDB88DF68C88A4DE7FF0FB58398F104619E855A6250D37496A4CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: [*y
                                                                      • API String ID: 0-3642367475
                                                                      • Opcode ID: f920a7f17afa669f85dd4fa2bbc3f052cb99f05070bc78a3fd5f717c453881c3
                                                                      • Instruction ID: f49b88a051f724710f0cfdc48a2fab0be3c7391659c99e254e23c0044fb95fb4
                                                                      • Opcode Fuzzy Hash: f920a7f17afa669f85dd4fa2bbc3f052cb99f05070bc78a3fd5f717c453881c3
                                                                      • Instruction Fuzzy Hash: 9F318C746183858B8748DF28D45641ABBE1FBCC308F405B2DF8CAAB291D7789641CB8B
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: dk
                                                                      • API String ID: 0-2586313868
                                                                      • Opcode ID: 8a4805f75226fc2840e2c7b063b7b1e39b1ba6f4f5ce1306a123ad924c24cf9d
                                                                      • Instruction ID: bd21a50a93d9ce141822b95cdb4ee263f008649e2ad7f0911c2a62c734e6813a
                                                                      • Opcode Fuzzy Hash: 8a4805f75226fc2840e2c7b063b7b1e39b1ba6f4f5ce1306a123ad924c24cf9d
                                                                      • Instruction Fuzzy Hash: 8631E4B0508B808BC75CDF28C49A51BBBF1FBC6354F504A1CF686863A0DBB6D849CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: m?@
                                                                      • API String ID: 0-4017832957
                                                                      • Opcode ID: 92bb4875fae3dfbb536cc4a594f9b8f02b4b9fef725d60d218a6fcb850c1db5e
                                                                      • Instruction ID: 763f89865c62d32814b91696e152b9bff8d9fc03c4acc356d14baff2dc9750fc
                                                                      • Opcode Fuzzy Hash: 92bb4875fae3dfbb536cc4a594f9b8f02b4b9fef725d60d218a6fcb850c1db5e
                                                                      • Instruction Fuzzy Hash: B231BF752187858BC749DF28C04A41ABBE1FB8D30CF504B2DF4CAA6350D778D616CB4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: MR
                                                                      • API String ID: 0-1985102067
                                                                      • Opcode ID: c3045b5f67f41fb122cd1cd8de18bcca47d48181f2768d112050a64545bdb3cc
                                                                      • Instruction ID: 3dc758c2b0da019c4ef40f7354f1f5afd613488c2e2992af3e697213e5bda16f
                                                                      • Opcode Fuzzy Hash: c3045b5f67f41fb122cd1cd8de18bcca47d48181f2768d112050a64545bdb3cc
                                                                      • Instruction Fuzzy Hash: 9F215CB05187808BD749DF28C55941EBBE1BB9D30CF804B2DF4CAAA251D778DA05CF4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: h{9
                                                                      • API String ID: 0-709585855
                                                                      • Opcode ID: 158519ec253ad62ee934b2a1f06c22473a728e5d40c1cbc8d8e2591bd6c1f9a1
                                                                      • Instruction ID: 28d7748f9e23597285172eede27c795ca80d4d45ffdf147c2eecc812d7a7424c
                                                                      • Opcode Fuzzy Hash: 158519ec253ad62ee934b2a1f06c22473a728e5d40c1cbc8d8e2591bd6c1f9a1
                                                                      • Instruction Fuzzy Hash: A22180B152D785AFC788DF28C59991ABBE0FB98308F806E1DF9868A250D374D545CB43
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: =WQ
                                                                      • API String ID: 0-979633440
                                                                      • Opcode ID: beecb343f63eb420ad30c3b234d671f41fcffe89ae230601040905a52fbe6922
                                                                      • Instruction ID: f1c989dca105177ef840caf4573424004201902730bc760d24db79eb0592445f
                                                                      • Opcode Fuzzy Hash: beecb343f63eb420ad30c3b234d671f41fcffe89ae230601040905a52fbe6922
                                                                      • Instruction Fuzzy Hash: 2C2146746187848B8749DF28C44A51ABBE1BB8D30CF804B1DF8CAAB250D7789A05CB4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0d58b218a6fad6bc529337baac5d9ed9f8b1cbf9dbb0a3b92ec118c03c99fb86
                                                                      • Instruction ID: c77f93fcecba916d7a728a8c6eb3e78c0c4fd01b54dcd62d4346d4040ea08623
                                                                      • Opcode Fuzzy Hash: 0d58b218a6fad6bc529337baac5d9ed9f8b1cbf9dbb0a3b92ec118c03c99fb86
                                                                      • Instruction Fuzzy Hash: 28E11E7090470D8FCF59DF68D446AEE7BB6FB48344F504129EC4EAB251DB74AA08CB86
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1c8b8be56366865ecfdde9c8b2ec8895e219799960cb59c8d6409a7e773344f9
                                                                      • Instruction ID: 37013b96f87cdafdf9e9430ef7fa874701b46d6ad591addafa58d16b7588ecf0
                                                                      • Opcode Fuzzy Hash: 1c8b8be56366865ecfdde9c8b2ec8895e219799960cb59c8d6409a7e773344f9
                                                                      • Instruction Fuzzy Hash: 7E811370D047098FDB89CFA8D4856EEBBF1FB48314F14812EE846B6250CB788A49CF59
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 636ed3c89b38e63114f2d2672b542ea9429d7597145989221425ac881483aa9e
                                                                      • Instruction ID: 9c3afdfbfdf497047419e96e23ac648a32a0c35cf7c10b77ff2162508d5b9c58
                                                                      • Opcode Fuzzy Hash: 636ed3c89b38e63114f2d2672b542ea9429d7597145989221425ac881483aa9e
                                                                      • Instruction Fuzzy Hash: 68715B70A0460D8FCFA9DF64D0857EE77F2FB48348F109169E856972A2DB74DA18CB84
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 62b2812e5277d79cf71890da185327c00cb0182960b11156e794a9778dcccdd1
                                                                      • Instruction ID: 96a2ca05932f578597b6f31f20a9b51789f655d9034ffcd243468df0dde1503e
                                                                      • Opcode Fuzzy Hash: 62b2812e5277d79cf71890da185327c00cb0182960b11156e794a9778dcccdd1
                                                                      • Instruction Fuzzy Hash: 8B6108B050424D8FCB99CF28C48A6DA7FE0FB58348F61422DF84AA6250D778D694CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0a7e039c7e162bbace75073517b23d1c0edb14752be4eceffb74d3575dc747b7
                                                                      • Instruction ID: e11998f87687b7015f7b025411e2dba788bee123d684f62271b2fcc2a6602c8d
                                                                      • Opcode Fuzzy Hash: 0a7e039c7e162bbace75073517b23d1c0edb14752be4eceffb74d3575dc747b7
                                                                      • Instruction Fuzzy Hash: 74516C3011C7889FD7A9DF28C48A7ABBBF2FB88354F405A1DE4CA83251D775A5468B43
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 37b3c9751f9c0622dad5cee6893bdb18b89ef97b8e375e51f8b49718ad0ca1ed
                                                                      • Instruction ID: 3c9e139cfc3177b9e6430d12f2245ff46c98974f9447e7844960b67abc7cc201
                                                                      • Opcode Fuzzy Hash: 37b3c9751f9c0622dad5cee6893bdb18b89ef97b8e375e51f8b49718ad0ca1ed
                                                                      • Instruction Fuzzy Hash: 2C416E705197449FD7D5CF28C489B5EBBE0FB88744F80A92DF485C2291CB74C9498B03
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d93e85a75c27503c9e550547e6f4dbe74bfd5b550d549da600d4a1fb4778da09
                                                                      • Instruction ID: 8d3aa2995036c6943faeb837d6d259061f9fd1ebb01e44e177952bfba46c1523
                                                                      • Opcode Fuzzy Hash: d93e85a75c27503c9e550547e6f4dbe74bfd5b550d549da600d4a1fb4778da09
                                                                      • Instruction Fuzzy Hash: BC51B5B190038E9FCB48CF68D8865DE7BF0FB48358F508A19F826A7250D3B49664CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c2a73fccebe1b17c37a08eaad88bc03e676d8e4e44166d1bd6bc2a62feffe697
                                                                      • Instruction ID: 3bfbec68728c413781f4eceae801228648357d86044db0a2bb780f5116396d21
                                                                      • Opcode Fuzzy Hash: c2a73fccebe1b17c37a08eaad88bc03e676d8e4e44166d1bd6bc2a62feffe697
                                                                      • Instruction Fuzzy Hash: 4951B5B190074E8FCB48DFA8D88A5DE7BB1FB48348F04861DE826A7350D3B49564CF95
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4330d8994c454f3a4ce2cb979804135e217ee49caa662d464dea2a0ef5ce2a30
                                                                      • Instruction ID: 53b90e1c5486c9cc5d3a4e2843fa79abd377b3644fddba8a35b35de5b3b72a9d
                                                                      • Opcode Fuzzy Hash: 4330d8994c454f3a4ce2cb979804135e217ee49caa662d464dea2a0ef5ce2a30
                                                                      • Instruction Fuzzy Hash: AA51A4B590038E8FCF48DF64C88A5DE7BB1FB48348F014A19E86AA6350D7B4D665CF85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: f6e19dd2ecc4b4f98e7bd80107de5ee987440c0ef4aaf5382ea96953c73351d3
                                                                      • Instruction ID: e1ff16132d2196f3f75472eef2dbafaed56c0de40c9f91af0ed0f4743424dce2
                                                                      • Opcode Fuzzy Hash: f6e19dd2ecc4b4f98e7bd80107de5ee987440c0ef4aaf5382ea96953c73351d3
                                                                      • Instruction Fuzzy Hash: 7241E3B190034A8FCB48CF68C8865DE7FB1FB58358F10861DE85AAA360D77496A4CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 00ebc5b3581f268e1dca31b076cde8af601d69c20f797ec800b8524e8aca152a
                                                                      • Instruction ID: 71fd5f9204d30feec7a15df1bf9f79d56724cbe4fb23e8fa5a2523106a8ad13f
                                                                      • Opcode Fuzzy Hash: 00ebc5b3581f268e1dca31b076cde8af601d69c20f797ec800b8524e8aca152a
                                                                      • Instruction Fuzzy Hash: 2C51B2B080034E9FCB48CFA8D48A4DEBFF0FB58398F245619E859A6250D3749695CFD5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1f4f6e8d1d7fb1cefad6bab8572f86962bf991beacb3f1c3af335354cec980e2
                                                                      • Instruction ID: 13dd754d1e7aaa458ccf3f25f1a53950ed55eb7a2af7c94b5f3f3eca6f4c7b71
                                                                      • Opcode Fuzzy Hash: 1f4f6e8d1d7fb1cefad6bab8572f86962bf991beacb3f1c3af335354cec980e2
                                                                      • Instruction Fuzzy Hash: 4141B3B090434E8FCB48DF68C48A4CE7FB0FB58398F204619E856A6250D3B496A5CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b99b47e9b962ad4e889b98a468eb4c97838fe937d78fd3ed328a07435872d91a
                                                                      • Instruction ID: 25ea7a1fae7cee08e525b2e53d13b9e761fafe3c3046f9c16da3d4363f6b727f
                                                                      • Opcode Fuzzy Hash: b99b47e9b962ad4e889b98a468eb4c97838fe937d78fd3ed328a07435872d91a
                                                                      • Instruction Fuzzy Hash: 7641F0B090078E8BCF48CF68C88A4DE7FB0FB48358F54461DE86AA6350D3B49664CF85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 83981cbbf60b78e7deea3e04e91402b42a32efa8c5dfd88cb8f56556e6fb0c3c
                                                                      • Instruction ID: 2f3c92175ef08bfcd336efc03048a581a759bd19a61f5d08681f8b59d2b4a65d
                                                                      • Opcode Fuzzy Hash: 83981cbbf60b78e7deea3e04e91402b42a32efa8c5dfd88cb8f56556e6fb0c3c
                                                                      • Instruction Fuzzy Hash: CA41EF70508B898FE3A8DF29C48950BBBF2FBC5354F104A1DF69686360D7B5D845CB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 94030778b375274538e88af110c4c71a5f626c7493089532c44927a023a09910
                                                                      • Instruction ID: 881360cf52284626b478287e7223753f8540b5b8a242225130398fb52c45b4e6
                                                                      • Opcode Fuzzy Hash: 94030778b375274538e88af110c4c71a5f626c7493089532c44927a023a09910
                                                                      • Instruction Fuzzy Hash: 9141B1B090034E8FCF48CF68C48A5DEBFB0FB68398F214619E855A6250D3B496A5CFC5
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 93974b6d4f6273d20610df347467165d2a5c3046e1daec97411395bd01693f1f
                                                                      • Instruction ID: 9c4ff176952ec0d3a7c23327861baecbe751e07bc56d6e6d0065064954d6898b
                                                                      • Opcode Fuzzy Hash: 93974b6d4f6273d20610df347467165d2a5c3046e1daec97411395bd01693f1f
                                                                      • Instruction Fuzzy Hash: D93113B0508B84CBD7B4DF24C08979ABBE0FBC4758F608A1CE5D9C6261DBB4984DDB42
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 613fb402d6b778ceaf7e513f493c666c428009a0501ff02ca6debf04feb91865
                                                                      • Instruction ID: 2086fc6cf530452ca317dde1c3f5989bf97dc2ab51b7d711b1b7619edf53518f
                                                                      • Opcode Fuzzy Hash: 613fb402d6b778ceaf7e513f493c666c428009a0501ff02ca6debf04feb91865
                                                                      • Instruction Fuzzy Hash: 9A4107B090034D9FCF48DF68C89A5DEBFB1FB48358F10865DE96AA6250D3B49664CF84
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a391d5f1ee034caf47bfedc7cfbee3ee0130da0d99d6425c5f03999ced993457
                                                                      • Instruction ID: 1338ccaed59e81eda3dfb0132a5285c9e75a0d4e8ad1c64b0ac71650cc1258ea
                                                                      • Opcode Fuzzy Hash: a391d5f1ee034caf47bfedc7cfbee3ee0130da0d99d6425c5f03999ced993457
                                                                      • Instruction Fuzzy Hash: 5541E4B190075ECFCF44CFA8D88A4CE7BF0FB08358F144619E869A6210D3B49658CF99
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: fd33be4bf54c8c25dddb299aef1f30db163f836ea6c92e4bd2e4a70074cec26c
                                                                      • Instruction ID: 90c54515c462ca516bd1a7834683e0366852147f904ce70d700c1fd94530822e
                                                                      • Opcode Fuzzy Hash: fd33be4bf54c8c25dddb299aef1f30db163f836ea6c92e4bd2e4a70074cec26c
                                                                      • Instruction Fuzzy Hash: D33198B16187848BD788DF28D44941ABBE1FBDC30CF405B1DF4CAAA360D7789644CB4A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4dc2512c0ff6dc22a4fb7ff1d0ea1563faee4dc38c2ddbd287c0bb24e1b40528
                                                                      • Instruction ID: 9655ad274102c7f9d75b202b541ab5cd2305fe15ce58f1dcda736dbe1a9cecaf
                                                                      • Opcode Fuzzy Hash: 4dc2512c0ff6dc22a4fb7ff1d0ea1563faee4dc38c2ddbd287c0bb24e1b40528
                                                                      • Instruction Fuzzy Hash: 3B2146B46183858B8389DF28D04A41ABBE1FBCC308F905B1DF4CAAB254D77896558B4B
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 443cbba6f5f89cfce6496fb7e303af42859a42b87001d497a7063cf79c72ec44
                                                                      • Instruction ID: 28a8b9ee08791f4b35668e747dad36529c2fac2b53c208ad34d18e94405bcf7a
                                                                      • Opcode Fuzzy Hash: 443cbba6f5f89cfce6496fb7e303af42859a42b87001d497a7063cf79c72ec44
                                                                      • Instruction Fuzzy Hash: 8E21D870529784ABC788DF18C58A55ABBF0FBC5758F80691DF8C686251C7B4D906CB43
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383775836.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                      Yara matches
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b24567682a71932b9bd3cac4b142caf72f763870487d30b345218c61caa1d775
                                                                      • Instruction ID: 3473a0eaf58d43c1d16632198f29a9e85fcf3b0d6ee31105f780c840bc6bd29d
                                                                      • Opcode Fuzzy Hash: b24567682a71932b9bd3cac4b142caf72f763870487d30b345218c61caa1d775
                                                                      • Instruction Fuzzy Hash: 0E2148741087848FC398EF28C08A41BBBE0BB9C35CF400B1DF4CAA7265D7B8D6558B0A
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invoke_watson_if_error$DebugOutputString$_invoke_watson_if_oneof$_itow_s_unlock_wcsftime_l
                                                                      • String ID: %s(%d) : %s$(*_errno())$, Line $<file unknown>$Assertion failed!$Assertion failed: $Second Chance Assertion Failed: File $_CrtDbgReport: String too long or IO Error$_CrtDbgReport: String too long or Invalid characters in String$_VCrtDbgReportA$_itoa_s(nLine, szLineMessage, 4096, 10)$e = mbstowcs_s(&ret, szOutMessage2, 4096, szOutMessage, ((size_t)-1))$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrptt.c$strcat_s(szLineMessage, 4096, "\n")$strcat_s(szLineMessage, 4096, "\r")$strcat_s(szLineMessage, 4096, szUserMessage)$strcpy_s(szLineMessage, 4096, szFormat ? "Assertion failed: " : "Assertion failed!")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$strcpy_s(szUserMessage, 4096, "_CrtDbgReport: String too long or IO Error")$wcscpy_s(szOutMessage2, 4096, L"_CrtDbgReport: String too long or Invalid characters in String")$6o$Pl
                                                                      • API String ID: 242677333-579931786
                                                                      • Opcode ID: a63f40807382e4d475d486b4876b23bc4dd58b7e370bc0180856c528c8acbbda
                                                                      • Instruction ID: 530da99e10e99e62cbd52b31bc2248c3243c4e9fe9ba471772112c9cd1faf228
                                                                      • Opcode Fuzzy Hash: a63f40807382e4d475d486b4876b23bc4dd58b7e370bc0180856c528c8acbbda
                                                                      • Instruction Fuzzy Hash: B5320C3590CA8699E7309B18EC643EE73A1FB88385F801235D79D43A9ADF7CD549CB80
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invoke_watson_if_error$FileModuleName
                                                                      • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowW$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$wcscpy_s(szExeName, 260, L"<program name unknown>")$wcscpy_s(szOutMessage, 4096, L"_CrtDbgReport: String too long or IO Error")
                                                                      • API String ID: 1949418964-1840610800
                                                                      • Opcode ID: b12b1314681225994c561f9efc1de4d9c7126b4e593a535ef46bdf2ab838bdf2
                                                                      • Instruction ID: 56c28598eff23d7efa3f9aefac5c51a225fbddaa182e52abe6c7f17511258791
                                                                      • Opcode Fuzzy Hash: b12b1314681225994c561f9efc1de4d9c7126b4e593a535ef46bdf2ab838bdf2
                                                                      • Instruction Fuzzy Hash: 24F1F93550CBC699E674DB58E8643AAB3A4FB88780F504136DBDD42BAADF3CE155CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invoke_watson_if_error$_invalid_parameter
                                                                      • String ID: For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts.$File: $Line: $Module: $(*_errno())$...$<program name unknown>$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Expression: $Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$memcpy_s(szShortProgName, sizeof(TCHAR) * (260 - (szShortProgName - szExeName)), dotdotdot, sizeof(TCHAR) * 3)$strcpy_s(szExeName, 260, "<program name unknown>")$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")$m*
                                                                      • API String ID: 2356156361-2279852085
                                                                      • Opcode ID: 6f4650fd4357eea9b956771a13d9b8a3362ab7c768ecc2367610c4505c6cb5c5
                                                                      • Instruction ID: 41b0a3ef1f3153133829357f45e10c41d95160e844f37e20b3376b6796923fd1
                                                                      • Opcode Fuzzy Hash: 6f4650fd4357eea9b956771a13d9b8a3362ab7c768ecc2367610c4505c6cb5c5
                                                                      • Instruction Fuzzy Hash: 69C1F97550CAC699EB709B19E8603EAB3A5FB883C4F400136D79D46BAADF3CD155CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: FileHandleWrite
                                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $_NMSG_WRITE$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\crt0msg.c$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"\n\n")$wcscat_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), error_text)$wcscpy_s(outmsg, (sizeof(outmsg) / sizeof(outmsg[0])), L"Runtime Error!\n\nProgram: ")$wcscpy_s(progname, progname_size, L"<program name unknown>")$wcsncpy_s(pch, progname_size - (pch - progname), L"...", 3)$_$0I$2H
                                                                      • API String ID: 3320372497-2837547082
                                                                      • Opcode ID: bb867b9cd4420929bdb9afde1297a67263cb8f1db9c8fa78cbb90456e5291ccd
                                                                      • Instruction ID: 6e6f59541febc9b253ba1bbeb9ea299fb76cf89889168d70b165be632701cfad
                                                                      • Opcode Fuzzy Hash: bb867b9cd4420929bdb9afde1297a67263cb8f1db9c8fa78cbb90456e5291ccd
                                                                      • Instruction Fuzzy Hash: 72915F31A0CA8689EB70DB58E8643FA6760FB84784F901236D7AE437A5DF3DE544CB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProc
                                                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                      • API String ID: 2574300362-564504941
                                                                      • Opcode ID: 6419c91a8387a46f3245e2fe33ee525fa99a19ae0c1292820c60068700cd62ec
                                                                      • Instruction ID: dc31a0fb75f5936d9d233475773bd230d13ea7cc137e870fa7a8ff23e7a6001d
                                                                      • Opcode Fuzzy Hash: 6419c91a8387a46f3245e2fe33ee525fa99a19ae0c1292820c60068700cd62ec
                                                                      • Instruction Fuzzy Hash: 4951AA7990DA968AE660DB19FC643AA73A0FF847D4F512035DB8E43A64DF7CE484CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWidewcsncnt
                                                                      • String ID:
                                                                      • API String ID: 641786319-0
                                                                      • Opcode ID: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                                      • Instruction ID: 26a348181a4f8f01245fee4c716417cbcc093f1607f98d8098a58a8b50b91dcd
                                                                      • Opcode Fuzzy Hash: dd68202ae9e70015e3243afc192c87c9af493ce1bfd3ef4005d4635320cae465
                                                                      • Instruction Fuzzy Hash: FB02F93660CA8589D7609B19E8603EAB7A4FBC47A0F504236E7AD47BE9DF7CD444CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 20%
                                                                      			E00007FF87FF8BE5940B0(void* __ecx, void* __edi, void* __esi, void* __esp, void* __eflags, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, void* _a16, long long _a24, void* _a32, signed int* _a40, signed int _a48, signed int _a56, long long _a64) {
                                                                      				long long _v24;
                                                                      				long long _v32;
                                                                      				char _v56;
                                                                      				long long _v64;
                                                                      				long long _v72;
                                                                      				char _v80;
                                                                      				void* _v88;
                                                                      				void* _v96;
                                                                      				intOrPtr _v104;
                                                                      				void* _v112;
                                                                      				intOrPtr _v120;
                                                                      				void* _v128;
                                                                      				char _v132;
                                                                      				char _v136;
                                                                      				long long _v144;
                                                                      				signed int _v152;
                                                                      				char _v160;
                                                                      				signed char _v164;
                                                                      				signed int _v168;
                                                                      				char _v176;
                                                                      				char _v184;
                                                                      				long long _v192;
                                                                      				signed char _v200;
                                                                      				long long _v208;
                                                                      				signed int _v216;
                                                                      				signed int _v224;
                                                                      				long long _v232;
                                                                      				void* _t222;
                                                                      				void* _t244;
                                                                      				void* _t295;
                                                                      				long long _t302;
                                                                      				long long _t303;
                                                                      				intOrPtr _t311;
                                                                      				long long _t312;
                                                                      				long long _t321;
                                                                      				intOrPtr _t325;
                                                                      				long long _t329;
                                                                      				long long _t330;
                                                                      				long long _t332;
                                                                      
                                                                      				_t295 = __rax;
                                                                      				_a32 = __r9;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __rcx;
                                                                      				_v164 = 0;
                                                                      				_v152 = 0;
                                                                      				_v168 = E00007FF87FF8BE593B40(_a40, _a32);
                                                                      				E00007FF87FF8BE58E500(_a16, _a32, _a40,  &_v160);
                                                                      				if (_v168 - E00007FF87FF8BE593C70(_t295, _a16, _a32, _a40) <= 0) goto 0xbe594176;
                                                                      				r9d = _v168;
                                                                      				E00007FF87FF8BE593BD0(_t217,  &_v160, _a32, _a40);
                                                                      				r9d = _v168;
                                                                      				E00007FF87FF8BE593C00(_v168 - E00007FF87FF8BE593C70(_t295, _a16, _a32, _a40), _t295, _a16, _a32, _a40);
                                                                      				goto 0xbe594197;
                                                                      				_v168 = E00007FF87FF8BE593C70(_t295, _a16, _a32, _a40);
                                                                      				if (_v168 - 0xffffffff < 0) goto 0xbe5941b1;
                                                                      				if (_v168 - _a40[1] >= 0) goto 0xbe5941b1;
                                                                      				goto 0xbe5941b6;
                                                                      				_t222 = E00007FF87FF8BE58CF80(_a40);
                                                                      				if ( *_a8 != 0xe06d7363) goto 0xbe594398;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xbe594398;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xbe594213;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xbe594213;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xbe594398;
                                                                      				_t302 = _a8;
                                                                      				if ( *((long long*)(_t302 + 0x30)) != 0) goto 0xbe594398;
                                                                      				0xbe584000();
                                                                      				if ( *((long long*)(_t302 + 0xf0)) != 0) goto 0xbe59423a;
                                                                      				goto 0xbe594862;
                                                                      				0xbe584000();
                                                                      				_t303 =  *((intOrPtr*)(_t302 + 0xf0));
                                                                      				_a8 = _t303;
                                                                      				0xbe584000();
                                                                      				_a24 =  *((intOrPtr*)(_t303 + 0xf8));
                                                                      				_v164 = 1;
                                                                      				E00007FF87FF8BE58E6E0(_t222, _a8,  *((intOrPtr*)(_a8 + 0x38)));
                                                                      				if (E00007FF87FF8BE59D2C0(1, _a8) == 0) goto 0xbe594290;
                                                                      				goto 0xbe594295;
                                                                      				E00007FF87FF8BE58CF80(_a8);
                                                                      				if ( *_a8 != 0xe06d7363) goto 0xbe5942fa;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xbe5942fa;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xbe5942e6;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xbe5942e6;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xbe5942fa;
                                                                      				_t311 = _a8;
                                                                      				if ( *((long long*)(_t311 + 0x30)) != 0) goto 0xbe5942fa;
                                                                      				E00007FF87FF8BE58CF80(_t311);
                                                                      				0xbe584000();
                                                                      				if ( *((long long*)(_t311 + 0x108)) == 0) goto 0xbe594398;
                                                                      				0xbe584000();
                                                                      				_t312 =  *((intOrPtr*)(_t311 + 0x108));
                                                                      				_v144 = _t312;
                                                                      				0xbe584000();
                                                                      				 *((long long*)(_t312 + 0x108)) = 0;
                                                                      				if ((E00007FF87FF8BE595BB0(_t312, _a8, _v144) & 0x000000ff) == 0) goto 0xbe594349;
                                                                      				goto 0xbe594398;
                                                                      				if ((E00007FF87FF8BE595CC0(_v144) & 0x000000ff) == 0) goto 0xbe594393;
                                                                      				E00007FF87FF8BE595AB0(1, _a8);
                                                                      				E00007FF87FF8BE594870( &_v56, "bad exception");
                                                                      				E00007FF87FF8BE59D320(__edi, __esi, __esp,  &_v56, 0xbe5aa160);
                                                                      				goto 0xbe594398;
                                                                      				E00007FF87FF8BE58CF50(_t312);
                                                                      				if ( *_a8 != 0xe06d7363) goto 0xbe5947d9;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x18)) != 4) goto 0xbe5947d9;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930520) goto 0xbe5943f5;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) == 0x19930521) goto 0xbe5943f5;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) != 0x19930522) goto 0xbe5947d9;
                                                                      				if (_a40[3] <= 0) goto 0xbe59466c;
                                                                      				_v216 = _a32;
                                                                      				_v224 =  &_v132;
                                                                      				_t321 =  &_v136;
                                                                      				_v232 = _t321;
                                                                      				r9d = _v168;
                                                                      				r8d = _a56;
                                                                      				E00007FF87FF8BE58EA30(_a16, _a40);
                                                                      				_v128 = _t321;
                                                                      				goto 0xbe59447e;
                                                                      				_v136 = _v136 + 1;
                                                                      				_v128 = _v128 + 0x14;
                                                                      				if (_v136 - _v132 >= 0) goto 0xbe59466c;
                                                                      				if ( *_v128 - _v168 > 0) goto 0xbe5944b3;
                                                                      				_t325 = _v128;
                                                                      				if (_v168 -  *((intOrPtr*)(_t325 + 4)) <= 0) goto 0xbe5944b5;
                                                                      				goto 0xbe59445a;
                                                                      				E00007FF87FF8BE58E680( *((intOrPtr*)(_t325 + 4)), _t325);
                                                                      				_v112 = _t325 +  *((intOrPtr*)(_v128 + 0x10));
                                                                      				_v120 =  *((intOrPtr*)(_v128 + 0xc));
                                                                      				_v120 = _v120 - 1;
                                                                      				_t329 = _v112 + 0x14;
                                                                      				_v112 = _t329;
                                                                      				if (_v120 <= 0) goto 0xbe594667;
                                                                      				_t244 = E00007FF87FF8BE58E6A0(_v120 - 1, _t329);
                                                                      				_t330 = _t329 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc)) + 4;
                                                                      				_v96 = _t330;
                                                                      				E00007FF87FF8BE58E6A0(_t244, _t330);
                                                                      				_v104 =  *((intOrPtr*)(_t330 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 0xc))));
                                                                      				goto 0xbe59457e;
                                                                      				_v104 = _v104 - 1;
                                                                      				_t332 = _v96 + 4;
                                                                      				_v96 = _t332;
                                                                      				if (_v104 <= 0) goto 0xbe594662;
                                                                      				E00007FF87FF8BE58E6A0(_v104 - 1, _t332);
                                                                      				_v88 = _t332 +  *_v96;
                                                                      				if (E00007FF87FF8BE594CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))) != 0) goto 0xbe5945ce;
                                                                      				goto 0xbe59455a;
                                                                      				_v152 = 1;
                                                                      				_v176 = _a48 & 0x000000ff;
                                                                      				_v184 = _v164 & 0x000000ff;
                                                                      				_v192 = _a64;
                                                                      				_v200 = _a56;
                                                                      				_v208 = _v128;
                                                                      				_v216 = _v88;
                                                                      				_v224 = _v112;
                                                                      				_v232 = _a40;
                                                                      				E00007FF87FF8BE595180(__edi, __esi, __esp, E00007FF87FF8BE594CD0(_v112, _v88,  *((intOrPtr*)(_a8 + 0x30))), _a8, _a16, _a24, _a32);
                                                                      				goto 0xbe594667;
                                                                      				goto 0xbe59455a;
                                                                      				goto L1;
                                                                      				goto 0xbe59445a;
                                                                      				__eax = _v152 & 0x000000ff;
                                                                      				__eflags = _v152 & 0x000000ff;
                                                                      				if ((_v152 & 0x000000ff) != 0) goto 0xbe5947d7;
                                                                      				__rax = _a40;
                                                                      				__eax =  *_a40;
                                                                      				__eax =  *_a40 & 0x1fffffff;
                                                                      				__eflags = __eax - 0x19930521;
                                                                      				if (__eax - 0x19930521 < 0) goto 0xbe5947d7;
                                                                      				__rax = _a40;
                                                                      				__eflags =  *(__rax + 0x20);
                                                                      				if ( *(__rax + 0x20) == 0) goto 0xbe5946bf;
                                                                      				__eax = E00007FF87FF8BE58E680(__eax, __rax);
                                                                      				_a40 = _a40[8];
                                                                      				_v32 = __rax;
                                                                      				goto 0xbe5946cb;
                                                                      				_v32 = 0;
                                                                      				__eflags = _v32;
                                                                      				if (_v32 == 0) goto 0xbe5947d7;
                                                                      				__rax = _a40;
                                                                      				__eflags =  *(__rax + 0x20);
                                                                      				if ( *(__rax + 0x20) == 0) goto 0xbe594706;
                                                                      				__eax = E00007FF87FF8BE58E680(__eax, __rax);
                                                                      				_a40 = _a40[8];
                                                                      				__rax = __rax + _a40[8];
                                                                      				_v24 = __rax;
                                                                      				goto 0xbe594712;
                                                                      				_v24 = 0;
                                                                      				__rdx = _v24;
                                                                      				__rcx = _a8;
                                                                      				E00007FF87FF8BE595BB0(__rax, _a8, _v24) = __al & 0x000000ff;
                                                                      				__eflags = __al & 0x000000ff;
                                                                      				if ((__al & 0x000000ff) != 0) goto 0xbe5947d7;
                                                                      				__rax = _a16;
                                                                      				_v64 = _a16;
                                                                      				__r9 =  &_v80;
                                                                      				__r8 = _a40;
                                                                      				__rdx = _a32;
                                                                      				__rcx = _a16;
                                                                      				__eax = E00007FF87FF8BE58E500(_a16, _a32, _a40,  &_v80);
                                                                      				_v64 = __rax;
                                                                      				_v72 = 0;
                                                                      				__eax = _a48 & 0x000000ff;
                                                                      				_v200 = __al;
                                                                      				__rax = _a32;
                                                                      				_v208 = _a32;
                                                                      				__rax = _a40;
                                                                      				_v216 = _a40;
                                                                      				_v224 = 0xffffffff;
                                                                      				_v232 = 0;
                                                                      				__r9 = _v64;
                                                                      				__r8 = _a24;
                                                                      				__rdx = _a8;
                                                                      				__rcx = _a16;
                                                                      				__eax = E00007FF87FF8BE58EDC0(__edi, __esi, __esp, _a16, _a8, _a24, _v64);
                                                                      				goto 0xbe59484c;
                                                                      				__rax = _a40;
                                                                      				__eflags =  *(__rax + 0xc);
                                                                      				if ( *(__rax + 0xc) <= 0) goto 0xbe59484c;
                                                                      				__eax = _a48 & 0x000000ff;
                                                                      				__eflags = _a48 & 0x000000ff;
                                                                      				if ((_a48 & 0x000000ff) != 0) goto 0xbe594847;
                                                                      				__rax = _a64;
                                                                      				_v208 = _a64;
                                                                      				__eax = _a56;
                                                                      				_v216 = _a56;
                                                                      				__eax = _v168;
                                                                      				_v224 = _v168;
                                                                      				__rax = _a40;
                                                                      				_v232 = _a40;
                                                                      				__r9 = _a32;
                                                                      				__r8 = _a24;
                                                                      				__rdx = _a16;
                                                                      				__rcx = _a8;
                                                                      				__eax = E00007FF87FF8BE594960(__ecx, _a8, _a16, _a24, _a32);
                                                                      				goto 0xbe59484c;
                                                                      				__eax = E00007FF87FF8BE58CF50(__rax);
                                                                      				0xbe584000();
                                                                      				__eflags =  *((long long*)(__rax + 0x108));
                                                                      				if ( *((long long*)(__rax + 0x108)) != 0) goto 0xbe59485d;
                                                                      				goto 0xbe594862;
                                                                      				return E00007FF87FF8BE58CF80(__rax);
                                                                      			}










































                                                                      0x7ff8be5940b0
                                                                      0x7ff8be5940b0
                                                                      0x7ff8be5940b5
                                                                      0x7ff8be5940ba
                                                                      0x7ff8be5940bf
                                                                      0x7ff8be5940cb
                                                                      0x7ff8be5940d0
                                                                      0x7ff8be5940ea
                                                                      0x7ff8be59410b
                                                                      0x7ff8be594131
                                                                      0x7ff8be594133
                                                                      0x7ff8be59414d
                                                                      0x7ff8be594152
                                                                      0x7ff8be59416f
                                                                      0x7ff8be594174
                                                                      0x7ff8be594193
                                                                      0x7ff8be59419c
                                                                      0x7ff8be5941ad
                                                                      0x7ff8be5941af
                                                                      0x7ff8be5941b1
                                                                      0x7ff8be5941c4
                                                                      0x7ff8be5941d6
                                                                      0x7ff8be5941eb
                                                                      0x7ff8be5941fc
                                                                      0x7ff8be59420d
                                                                      0x7ff8be594213
                                                                      0x7ff8be594220
                                                                      0x7ff8be594226
                                                                      0x7ff8be594233
                                                                      0x7ff8be594235
                                                                      0x7ff8be59423a
                                                                      0x7ff8be59423f
                                                                      0x7ff8be594246
                                                                      0x7ff8be59424e
                                                                      0x7ff8be59425a
                                                                      0x7ff8be594262
                                                                      0x7ff8be594273
                                                                      0x7ff8be59428c
                                                                      0x7ff8be59428e
                                                                      0x7ff8be594290
                                                                      0x7ff8be5942a3
                                                                      0x7ff8be5942b1
                                                                      0x7ff8be5942c2
                                                                      0x7ff8be5942d3
                                                                      0x7ff8be5942e4
                                                                      0x7ff8be5942e6
                                                                      0x7ff8be5942f3
                                                                      0x7ff8be5942f5
                                                                      0x7ff8be5942fa
                                                                      0x7ff8be594307
                                                                      0x7ff8be59430d
                                                                      0x7ff8be594312
                                                                      0x7ff8be594319
                                                                      0x7ff8be59431e
                                                                      0x7ff8be594323
                                                                      0x7ff8be594345
                                                                      0x7ff8be594347
                                                                      0x7ff8be594358
                                                                      0x7ff8be594364
                                                                      0x7ff8be594378
                                                                      0x7ff8be59438c
                                                                      0x7ff8be594391
                                                                      0x7ff8be594393
                                                                      0x7ff8be5943a6
                                                                      0x7ff8be5943b8
                                                                      0x7ff8be5943cd
                                                                      0x7ff8be5943de
                                                                      0x7ff8be5943ef
                                                                      0x7ff8be594401
                                                                      0x7ff8be59440f
                                                                      0x7ff8be59441c
                                                                      0x7ff8be594421
                                                                      0x7ff8be594429
                                                                      0x7ff8be59442e
                                                                      0x7ff8be594433
                                                                      0x7ff8be59444b
                                                                      0x7ff8be594450
                                                                      0x7ff8be594458
                                                                      0x7ff8be594463
                                                                      0x7ff8be594476
                                                                      0x7ff8be59448c
                                                                      0x7ff8be5944a0
                                                                      0x7ff8be5944a2
                                                                      0x7ff8be5944b1
                                                                      0x7ff8be5944b3
                                                                      0x7ff8be5944b5
                                                                      0x7ff8be5944c9
                                                                      0x7ff8be5944dc
                                                                      0x7ff8be5944ee
                                                                      0x7ff8be5944fd
                                                                      0x7ff8be594501
                                                                      0x7ff8be594511
                                                                      0x7ff8be594517
                                                                      0x7ff8be59452c
                                                                      0x7ff8be594531
                                                                      0x7ff8be594539
                                                                      0x7ff8be594551
                                                                      0x7ff8be594558
                                                                      0x7ff8be594563
                                                                      0x7ff8be594572
                                                                      0x7ff8be594576
                                                                      0x7ff8be594586
                                                                      0x7ff8be59458c
                                                                      0x7ff8be59459f
                                                                      0x7ff8be5945ca
                                                                      0x7ff8be5945cc
                                                                      0x7ff8be5945ce
                                                                      0x7ff8be5945db
                                                                      0x7ff8be5945e4
                                                                      0x7ff8be5945f0
                                                                      0x7ff8be5945fc
                                                                      0x7ff8be594608
                                                                      0x7ff8be594615
                                                                      0x7ff8be594622
                                                                      0x7ff8be59462f
                                                                      0x7ff8be594654
                                                                      0x7ff8be59465b
                                                                      0x7ff8be59465d
                                                                      0x7ff8be594662
                                                                      0x7ff8be594667
                                                                      0x7ff8be59466c
                                                                      0x7ff8be594671
                                                                      0x7ff8be594673
                                                                      0x7ff8be594679
                                                                      0x7ff8be594681
                                                                      0x7ff8be594683
                                                                      0x7ff8be594688
                                                                      0x7ff8be59468d
                                                                      0x7ff8be594693
                                                                      0x7ff8be59469b
                                                                      0x7ff8be59469f
                                                                      0x7ff8be5946a1
                                                                      0x7ff8be5946ae
                                                                      0x7ff8be5946b5
                                                                      0x7ff8be5946bd
                                                                      0x7ff8be5946bf
                                                                      0x7ff8be5946cb
                                                                      0x7ff8be5946d4
                                                                      0x7ff8be5946da
                                                                      0x7ff8be5946e2
                                                                      0x7ff8be5946e6
                                                                      0x7ff8be5946e8
                                                                      0x7ff8be5946f5
                                                                      0x7ff8be5946f9
                                                                      0x7ff8be5946fc
                                                                      0x7ff8be594704
                                                                      0x7ff8be594706
                                                                      0x7ff8be594712
                                                                      0x7ff8be59471a
                                                                      0x7ff8be594727
                                                                      0x7ff8be59472a
                                                                      0x7ff8be59472c
                                                                      0x7ff8be594732
                                                                      0x7ff8be59473a
                                                                      0x7ff8be594742
                                                                      0x7ff8be59474a
                                                                      0x7ff8be594752
                                                                      0x7ff8be59475a
                                                                      0x7ff8be594762
                                                                      0x7ff8be594767
                                                                      0x7ff8be59476f
                                                                      0x7ff8be59477b
                                                                      0x7ff8be594783
                                                                      0x7ff8be594787
                                                                      0x7ff8be59478f
                                                                      0x7ff8be594794
                                                                      0x7ff8be59479c
                                                                      0x7ff8be5947a1
                                                                      0x7ff8be5947a9
                                                                      0x7ff8be5947b2
                                                                      0x7ff8be5947ba
                                                                      0x7ff8be5947c2
                                                                      0x7ff8be5947ca
                                                                      0x7ff8be5947d2
                                                                      0x7ff8be5947d7
                                                                      0x7ff8be5947d9
                                                                      0x7ff8be5947e1
                                                                      0x7ff8be5947e5
                                                                      0x7ff8be5947e7
                                                                      0x7ff8be5947ef
                                                                      0x7ff8be5947f1
                                                                      0x7ff8be5947f3
                                                                      0x7ff8be5947fb
                                                                      0x7ff8be594800
                                                                      0x7ff8be594807
                                                                      0x7ff8be59480b
                                                                      0x7ff8be59480f
                                                                      0x7ff8be594813
                                                                      0x7ff8be59481b
                                                                      0x7ff8be594820
                                                                      0x7ff8be594828
                                                                      0x7ff8be594830
                                                                      0x7ff8be594838
                                                                      0x7ff8be594840
                                                                      0x7ff8be594845
                                                                      0x7ff8be594847
                                                                      0x7ff8be59484c
                                                                      0x7ff8be594851
                                                                      0x7ff8be594859
                                                                      0x7ff8be59485b
                                                                      0x7ff8be594869

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: BlockStateUnwind_inconsistency$ControlFromterminate$BaseDecodeEntryExceptionFunctionImageLookupPointerRaiseReadThrowValidatestd::bad_exception::bad_exceptionstd::exception::exceptiontype_info::operator==
                                                                      • String ID: bad exception$csm$csm$csm
                                                                      • API String ID: 3498492519-820278400
                                                                      • Opcode ID: 8c50efc0869d6d00d6f15bc2f3e4a8aa3cd75fee2d20c8f1ee388d100984527e
                                                                      • Instruction ID: f7cad3098bc0865fcce4b0866d8fb3f4a31300658fe3db7d3a1dad7f403d647d
                                                                      • Opcode Fuzzy Hash: 8c50efc0869d6d00d6f15bc2f3e4a8aa3cd75fee2d20c8f1ee388d100984527e
                                                                      • Instruction Fuzzy Hash: E112A77690CAC589D6719B19E4A13EEB7A0FB88784F504136DB9D47B99DF3CE880CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$_invalid_parameter$UpdateUpdate::~_
                                                                      • String ID: ( (_Stream->_flag & _IOSTRG) || ( fn = _fileno(_Stream), ( (_textmode_safe(fn) == __IOINFO_TM_ANSI) && !_tm_unicode_safe(fn))))$("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 4023976971-2293733425
                                                                      • Opcode ID: 2e8f2817575abf17236a5f031f9d249ff9066c6c73ed3770e2a1ff63e1bea630
                                                                      • Instruction ID: 7a2042d5170da3614a09669c1a55d0d9c1e3edc7ba2a113dc62c70cd5585a915
                                                                      • Opcode Fuzzy Hash: 2e8f2817575abf17236a5f031f9d249ff9066c6c73ed3770e2a1ff63e1bea630
                                                                      • Instruction Fuzzy Hash: 9A02287690C6C28AF7708B18E8683EAB7A4FB84384F401235D79D46AA9DF7CE545CF44
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                      • String ID: _mbstowcs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$s != NULL
                                                                      • API String ID: 530996419-3695252689
                                                                      • Opcode ID: fa484580cb52892c02ff67f95a17d1b2129cff6d1ab00e5c74c45926566419d1
                                                                      • Instruction ID: b51738b88f1c56ac333969bd0b98ac907bc8afbc7139c9bcd7b27bee1556a9bd
                                                                      • Opcode Fuzzy Hash: fa484580cb52892c02ff67f95a17d1b2129cff6d1ab00e5c74c45926566419d1
                                                                      • Instruction Fuzzy Hash: 0AD1293661CB8589D7609B19E8603AEB7A0FB84790F505636E79E83BE9DF7CD444CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: "$"$("Buffer too small", 0)$_wctomb_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wctomb.c$sizeInBytes <= INT_MAX$sizeInBytes > 0
                                                                      • API String ID: 2192614184-1854130327
                                                                      • Opcode ID: 0349e1f67bcf58a9467b2163a48374e143b216b4fcd3e10d2347f4427f3577c7
                                                                      • Instruction ID: 2bc9ea1f3f74a664e60064e8987ef6860da2e8ec41c497b42b81f79328c76519
                                                                      • Opcode Fuzzy Hash: 0349e1f67bcf58a9467b2163a48374e143b216b4fcd3e10d2347f4427f3577c7
                                                                      • Instruction Fuzzy Hash: D2C11A7690C6828AFBB09B58E8647EA77A1FB80384F404136D79D43AA9DF7CE444CF45
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$((state == ST_NORMAL) || (state == ST_TYPE))$(format != NULL)$(stream != NULL)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-1870338870
                                                                      • Opcode ID: 677b85930a9a5e10114940793937fb41496cbdaf58dc4485b8ee00e4ca785de0
                                                                      • Instruction ID: ac39ba06452d9b41ee6b3875f372532fb0e0d61e2846345ef8c42e01ecf7e193
                                                                      • Opcode Fuzzy Hash: 677b85930a9a5e10114940793937fb41496cbdaf58dc4485b8ee00e4ca785de0
                                                                      • Instruction Fuzzy Hash: 6CD1F8B690CA828AE7709B18E8643EBB7A0FB80389F401135D78D47A99DF7DE545CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 19%
                                                                      			E00007FF87FF8BE59C6D6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                      				signed int _t223;
                                                                      				signed char _t228;
                                                                      				intOrPtr _t263;
                                                                      				signed int _t338;
                                                                      				signed int _t339;
                                                                      				signed long long _t342;
                                                                      				intOrPtr* _t365;
                                                                      				signed long long _t390;
                                                                      
                                                                      				_t338 = __rax;
                                                                      				_a80 = _a80 | 0x00000040;
                                                                      				_a72 = 0xa;
                                                                      				_a72 = 0xa;
                                                                      				_a116 = 0x10;
                                                                      				asm("bts eax, 0xf");
                                                                      				_a708 = 7;
                                                                      				_a708 = 0x27;
                                                                      				_a72 = 0x10;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59c754;
                                                                      				_a84 = 0x30;
                                                                      				_a85 = _a708 + 0x51;
                                                                      				_a92 = 2;
                                                                      				_a72 = 8;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59c777;
                                                                      				asm("bts eax, 0x9");
                                                                      				if ((_a80 & 0x00008000) == 0) goto 0xbe59c79e;
                                                                      				E00007FF87FF8BE591EA0( &_a1112);
                                                                      				_a824 = _t338;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00001000) == 0) goto 0xbe59c7c5;
                                                                      				E00007FF87FF8BE591EA0( &_a1112);
                                                                      				_a824 = _t338;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00000020) == 0) goto 0xbe59c810;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c7f6;
                                                                      				_t339 = E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t339;
                                                                      				goto 0xbe59c80e;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t339;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c834;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t339;
                                                                      				goto 0xbe59c84b;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t339;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c882;
                                                                      				if (_a824 >= 0) goto 0xbe59c882;
                                                                      				_a832 =  ~_a824;
                                                                      				asm("bts eax, 0x8");
                                                                      				goto 0xbe59c892;
                                                                      				_t342 = _a824;
                                                                      				_a832 = _t342;
                                                                      				if ((_a80 & 0x00008000) != 0) goto 0xbe59c8c7;
                                                                      				if ((_a80 & 0x00001000) != 0) goto 0xbe59c8c7;
                                                                      				_a832 = _a832 & _t342;
                                                                      				if (_a116 >= 0) goto 0xbe59c8d8;
                                                                      				_a116 = 1;
                                                                      				goto 0xbe59c8f5;
                                                                      				_a80 = _a80 & 0xfffffff7;
                                                                      				if (_a116 - 0x200 <= 0) goto 0xbe59c8f5;
                                                                      				_a116 = 0x200;
                                                                      				if (_a832 != 0) goto 0xbe59c908;
                                                                      				_a92 = 0;
                                                                      				_a64 =  &_a687;
                                                                      				_t223 = _a116;
                                                                      				_a116 = _a116 - 1;
                                                                      				if (_t223 > 0) goto 0xbe59c936;
                                                                      				if (_a832 == 0) goto 0xbe59c9d3;
                                                                      				_a1040 = _a72;
                                                                      				_a816 = _t223 / _a1040 + 0x30;
                                                                      				_a1048 = _a72;
                                                                      				if (_a816 - 0x39 <= 0) goto 0xbe59c9b2;
                                                                      				_t228 = _a816 + _a708;
                                                                      				_a816 = _t228;
                                                                      				 *_a64 = _a816 & 0x000000ff;
                                                                      				_a64 = _a64 - 1;
                                                                      				goto 0xbe59c915;
                                                                      				_a104 = _t228;
                                                                      				_a64 = _a64 + 1;
                                                                      				if ((_a80 & 0x00000200) == 0) goto 0xbe59ca31;
                                                                      				if (_a104 == 0) goto 0xbe59ca12;
                                                                      				if ( *_a64 == 0x30) goto 0xbe59ca31;
                                                                      				_a64 = _a64 - 1;
                                                                      				 *_a64 = 0x30;
                                                                      				_a104 = _a104 + 1;
                                                                      				if (_a108 != 0) goto 0xbe59cc6e;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000100) == 0) goto 0xbe59ca63;
                                                                      				_a84 = 0x2d;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000001) == 0) goto 0xbe59ca7d;
                                                                      				_a84 = 0x2b;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000002) == 0) goto 0xbe59ca95;
                                                                      				_a84 = 0x20;
                                                                      				_a92 = 1;
                                                                      				_a840 = _a88 - _a104 - _a92;
                                                                      				if ((_a80 & 0x0000000c) != 0) goto 0xbe59cad5;
                                                                      				E00007FF87FF8BE59CF10(0x20, _a840, _a1088,  &_a688);
                                                                      				E00007FF87FF8BE59CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                      				if ((_a80 & 0x00000008) == 0) goto 0xbe59cb27;
                                                                      				if ((_a80 & 0x00000004) != 0) goto 0xbe59cb27;
                                                                      				E00007FF87FF8BE59CF10(0x30, _a840, _a1088,  &_a688);
                                                                      				if (_a76 == 0) goto 0xbe59cc1d;
                                                                      				if (_a104 <= 0) goto 0xbe59cc1d;
                                                                      				_a872 = 0;
                                                                      				_a848 = _a64;
                                                                      				_a856 = _a104;
                                                                      				_a856 = _a856 - 1;
                                                                      				if (_a856 == 0) goto 0xbe59cc1b;
                                                                      				_a1056 =  *_a848 & 0x0000ffff;
                                                                      				r9d = _a1056 & 0x0000ffff;
                                                                      				r8d = 6;
                                                                      				_a872 = E00007FF87FF8BE59B530( &_a860,  &_a864, _a1088);
                                                                      				_a848 =  &(_a848[1]);
                                                                      				if (_a872 != 0) goto 0xbe59cbe5;
                                                                      				if (_a860 != 0) goto 0xbe59cbf2;
                                                                      				_a688 = 0xffffffff;
                                                                      				goto 0xbe59cc1b;
                                                                      				E00007FF87FF8BE59CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                      				goto 0xbe59cb60;
                                                                      				goto 0xbe59cc3b;
                                                                      				E00007FF87FF8BE59CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                      				if (_a688 < 0) goto 0xbe59cc6e;
                                                                      				if ((_a80 & 0x00000004) == 0) goto 0xbe59cc6e;
                                                                      				E00007FF87FF8BE59CF10(0x20, _a840, _a1088,  &_a688);
                                                                      				if (_a96 == 0) goto 0xbe59cc8e;
                                                                      				0xbe585330();
                                                                      				_a96 = 0;
                                                                      				goto 0xbe59b99c;
                                                                      				if (_a704 == 0) goto 0xbe59ccb4;
                                                                      				if (_a704 == 7) goto 0xbe59ccb4;
                                                                      				_a1060 = 0;
                                                                      				goto 0xbe59ccbf;
                                                                      				_a1060 = 1;
                                                                      				_t263 = _a1060;
                                                                      				_a876 = _t263;
                                                                      				if (_a876 != 0) goto 0xbe59cd05;
                                                                      				_t365 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                      				_a32 = _t365;
                                                                      				r9d = 0;
                                                                      				r8d = 0x8f5;
                                                                      				0xbe58b3b0();
                                                                      				if (_t263 != 1) goto 0xbe59cd05;
                                                                      				asm("int3");
                                                                      				if (_a876 != 0) goto 0xbe59cd61;
                                                                      				0xbe58ab30();
                                                                      				 *_t365 = 0x16;
                                                                      				_a32 = 0;
                                                                      				r9d = 0x8f5;
                                                                      				E00007FF87FF8BE58BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      				_a912 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				goto 0xbe59cd80;
                                                                      				_a916 = _a688;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				return E00007FF87FF8BE583280(_a916, 2, 2, _a1064 ^ _t390, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      			}











                                                                      0x7ff8be59c6d6
                                                                      0x7ff8be59c6dd
                                                                      0x7ff8be59c6e1
                                                                      0x7ff8be59c6ee
                                                                      0x7ff8be59c6f8
                                                                      0x7ff8be59c704
                                                                      0x7ff8be59c70c
                                                                      0x7ff8be59c719
                                                                      0x7ff8be59c724
                                                                      0x7ff8be59c737
                                                                      0x7ff8be59c739
                                                                      0x7ff8be59c748
                                                                      0x7ff8be59c74c
                                                                      0x7ff8be59c756
                                                                      0x7ff8be59c769
                                                                      0x7ff8be59c76f
                                                                      0x7ff8be59c782
                                                                      0x7ff8be59c78c
                                                                      0x7ff8be59c791
                                                                      0x7ff8be59c799
                                                                      0x7ff8be59c7a9
                                                                      0x7ff8be59c7b3
                                                                      0x7ff8be59c7b8
                                                                      0x7ff8be59c7c0
                                                                      0x7ff8be59c7ce
                                                                      0x7ff8be59c7d9
                                                                      0x7ff8be59c7e8
                                                                      0x7ff8be59c7ec
                                                                      0x7ff8be59c7f4
                                                                      0x7ff8be59c7fe
                                                                      0x7ff8be59c806
                                                                      0x7ff8be59c80e
                                                                      0x7ff8be59c819
                                                                      0x7ff8be59c823
                                                                      0x7ff8be59c82a
                                                                      0x7ff8be59c832
                                                                      0x7ff8be59c83c
                                                                      0x7ff8be59c843
                                                                      0x7ff8be59c854
                                                                      0x7ff8be59c85f
                                                                      0x7ff8be59c86c
                                                                      0x7ff8be59c878
                                                                      0x7ff8be59c880
                                                                      0x7ff8be59c882
                                                                      0x7ff8be59c88a
                                                                      0x7ff8be59c89d
                                                                      0x7ff8be59c8aa
                                                                      0x7ff8be59c8bf
                                                                      0x7ff8be59c8cc
                                                                      0x7ff8be59c8ce
                                                                      0x7ff8be59c8d6
                                                                      0x7ff8be59c8df
                                                                      0x7ff8be59c8eb
                                                                      0x7ff8be59c8ed
                                                                      0x7ff8be59c8fe
                                                                      0x7ff8be59c900
                                                                      0x7ff8be59c910
                                                                      0x7ff8be59c915
                                                                      0x7ff8be59c91f
                                                                      0x7ff8be59c925
                                                                      0x7ff8be59c930
                                                                      0x7ff8be59c93b
                                                                      0x7ff8be59c95e
                                                                      0x7ff8be59c96a
                                                                      0x7ff8be59c997
                                                                      0x7ff8be59c9a9
                                                                      0x7ff8be59c9ab
                                                                      0x7ff8be59c9bf
                                                                      0x7ff8be59c9c9
                                                                      0x7ff8be59c9ce
                                                                      0x7ff8be59c9e0
                                                                      0x7ff8be59c9ec
                                                                      0x7ff8be59c9fc
                                                                      0x7ff8be59ca03
                                                                      0x7ff8be59ca10
                                                                      0x7ff8be59ca1a
                                                                      0x7ff8be59ca24
                                                                      0x7ff8be59ca2d
                                                                      0x7ff8be59ca36
                                                                      0x7ff8be59ca45
                                                                      0x7ff8be59ca52
                                                                      0x7ff8be59ca54
                                                                      0x7ff8be59ca59
                                                                      0x7ff8be59ca61
                                                                      0x7ff8be59ca6c
                                                                      0x7ff8be59ca6e
                                                                      0x7ff8be59ca73
                                                                      0x7ff8be59ca7b
                                                                      0x7ff8be59ca86
                                                                      0x7ff8be59ca88
                                                                      0x7ff8be59ca8d
                                                                      0x7ff8be59caa5
                                                                      0x7ff8be59cab5
                                                                      0x7ff8be59cad0
                                                                      0x7ff8be59caee
                                                                      0x7ff8be59cafc
                                                                      0x7ff8be59cb07
                                                                      0x7ff8be59cb22
                                                                      0x7ff8be59cb2c
                                                                      0x7ff8be59cb37
                                                                      0x7ff8be59cb3d
                                                                      0x7ff8be59cb4d
                                                                      0x7ff8be59cb59
                                                                      0x7ff8be59cb70
                                                                      0x7ff8be59cb79
                                                                      0x7ff8be59cb8a
                                                                      0x7ff8be59cb92
                                                                      0x7ff8be59cb9b
                                                                      0x7ff8be59cbb6
                                                                      0x7ff8be59cbc9
                                                                      0x7ff8be59cbd9
                                                                      0x7ff8be59cbe3
                                                                      0x7ff8be59cbe5
                                                                      0x7ff8be59cbf0
                                                                      0x7ff8be59cc11
                                                                      0x7ff8be59cc16
                                                                      0x7ff8be59cc1b
                                                                      0x7ff8be59cc36
                                                                      0x7ff8be59cc43
                                                                      0x7ff8be59cc4e
                                                                      0x7ff8be59cc69
                                                                      0x7ff8be59cc74
                                                                      0x7ff8be59cc80
                                                                      0x7ff8be59cc85
                                                                      0x7ff8be59cc8e
                                                                      0x7ff8be59cc9b
                                                                      0x7ff8be59cca5
                                                                      0x7ff8be59cca7
                                                                      0x7ff8be59ccb2
                                                                      0x7ff8be59ccb4
                                                                      0x7ff8be59ccbf
                                                                      0x7ff8be59ccc6
                                                                      0x7ff8be59ccd5
                                                                      0x7ff8be59ccd7
                                                                      0x7ff8be59ccde
                                                                      0x7ff8be59cce3
                                                                      0x7ff8be59cce6
                                                                      0x7ff8be59ccf8
                                                                      0x7ff8be59cd00
                                                                      0x7ff8be59cd02
                                                                      0x7ff8be59cd0d
                                                                      0x7ff8be59cd0f
                                                                      0x7ff8be59cd14
                                                                      0x7ff8be59cd1a
                                                                      0x7ff8be59cd23
                                                                      0x7ff8be59cd3e
                                                                      0x7ff8be59cd43
                                                                      0x7ff8be59cd53
                                                                      0x7ff8be59cd5f
                                                                      0x7ff8be59cd68
                                                                      0x7ff8be59cd74
                                                                      0x7ff8be59cd97

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg$wctomb_s
                                                                      • String ID: ("Incorrect format specifier", 0)$-$9$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2984758162-268265396
                                                                      • Opcode ID: 61945b808d8ddeeab049de188114ad7d55d89a3558f0f9168201042d10a77149
                                                                      • Instruction ID: fd24a5dca85a86372f76b44281bbf64c71529ac6e169a2f2c33ca65ac6d689bf
                                                                      • Opcode Fuzzy Hash: 61945b808d8ddeeab049de188114ad7d55d89a3558f0f9168201042d10a77149
                                                                      • Instruction Fuzzy Hash: CD02F67660CBC28AE771CB18E8A53AAB7A4F784790F540135E79D86A99DF7CE540CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: "$(pwcs == NULL && sizeInWords == 0) || (pwcs != NULL && sizeInWords > 0)$P$_mbstowcs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbstowcs.c$retsize <= sizeInWords
                                                                      • API String ID: 2192614184-660564692
                                                                      • Opcode ID: 51ea2d8a29ec6a42f4206cddb2a15a761283d0351a467ffd0ee92275139e1829
                                                                      • Instruction ID: 0bf0a3871ebd39c294f8c893c74e41446c472b3a5fdbd38356f9dc6e3de1e9bf
                                                                      • Opcode Fuzzy Hash: 51ea2d8a29ec6a42f4206cddb2a15a761283d0351a467ffd0ee92275139e1829
                                                                      • Instruction Fuzzy Hash: A0E1FC3690CBC689E7709B18E8643AA63A0FB84794F504636D7AD53AD9DF7CD488CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 57%
                                                                      			E00007FF87FF8BE5955F0(void* __ecx, long long __rcx, long long __rdx, signed int* __r8, signed int* __r9, long long _a8, void* _a16, signed int* _a24, signed int* _a32) {
                                                                      				long long _v24;
                                                                      				long long _v32;
                                                                      				long long _v40;
                                                                      				long long _v48;
                                                                      				long long _v56;
                                                                      				void* _v64;
                                                                      				long long _v72;
                                                                      				void* _t88;
                                                                      				void* _t89;
                                                                      				void* _t107;
                                                                      				void* _t109;
                                                                      				signed int* _t158;
                                                                      				signed int* _t160;
                                                                      				long long _t175;
                                                                      				long long _t186;
                                                                      				signed int* _t187;
                                                                      				signed int* _t193;
                                                                      
                                                                      				_a32 = __r9;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __rcx;
                                                                      				_v72 = 0;
                                                                      				_t158 = _a24;
                                                                      				if ( *((intOrPtr*)(_t158 + 4)) == 0) goto 0xbe595639;
                                                                      				_t89 = E00007FF87FF8BE58E680(_t88, _t158);
                                                                      				_v56 = _t158 + _a24[1];
                                                                      				goto 0xbe595642;
                                                                      				_v56 = 0;
                                                                      				if (_v56 == 0) goto 0xbe5956aa;
                                                                      				_t160 = _a24;
                                                                      				if ( *((intOrPtr*)(_t160 + 4)) == 0) goto 0xbe595673;
                                                                      				E00007FF87FF8BE58E680(_t89, _t160);
                                                                      				_v48 = _t160 + _a24[1];
                                                                      				goto 0xbe59567c;
                                                                      				_v48 = 0;
                                                                      				if ( *((char*)(_v48 + 0x10)) == 0) goto 0xbe5956aa;
                                                                      				if (_a24[2] != 0) goto 0xbe5956b1;
                                                                      				if (( *_a24 & 0x80000000) != 0) goto 0xbe5956b1;
                                                                      				goto 0xbe595966;
                                                                      				if (( *_a24 & 0x80000000) == 0) goto 0xbe5956d0;
                                                                      				_v64 = _a16;
                                                                      				goto 0xbe5956e9;
                                                                      				_v64 = _a24[2] +  *_a16;
                                                                      				if (( *_a24 & 0x00000008) == 0) goto 0xbe595765;
                                                                      				if (E00007FF87FF8BE59D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xbe59575b;
                                                                      				if (E00007FF87FF8BE59D2C0(1, _v64) == 0) goto 0xbe59575b;
                                                                      				 *_v64 =  *((intOrPtr*)(_a8 + 0x28));
                                                                      				_t175 = _v64;
                                                                      				E00007FF87FF8BE595B30(_t100,  *_t175,  &(_a32[2]));
                                                                      				 *_v64 = _t175;
                                                                      				goto 0xbe595760;
                                                                      				E00007FF87FF8BE58CF80(_t175);
                                                                      				goto 0xbe59595a;
                                                                      				if (( *_a32 & 0x00000001) == 0) goto 0xbe595813;
                                                                      				if (E00007FF87FF8BE59D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xbe595809;
                                                                      				if (E00007FF87FF8BE59D2C0(1, _v64) == 0) goto 0xbe595809;
                                                                      				_t107 = E00007FF87FF8BE58C410(__ecx, E00007FF87FF8BE59D2C0(1, _v64), _v64,  *((intOrPtr*)(_a8 + 0x28)), _a32[5]);
                                                                      				if (_a32[5] != 8) goto 0xbe595807;
                                                                      				if ( *_v64 == 0) goto 0xbe595807;
                                                                      				_t186 = _v64;
                                                                      				E00007FF87FF8BE595B30(_t107,  *_t186,  &(_a32[2]));
                                                                      				 *_v64 = _t186;
                                                                      				goto 0xbe59580e;
                                                                      				_t109 = E00007FF87FF8BE58CF80(_t186);
                                                                      				goto 0xbe59595a;
                                                                      				_t187 = _a32;
                                                                      				if ( *((intOrPtr*)(_t187 + 0x18)) == 0) goto 0xbe59583c;
                                                                      				E00007FF87FF8BE58E6A0(_t109, _t187);
                                                                      				_v40 = _t187 + _a32[6];
                                                                      				goto 0xbe595845;
                                                                      				_v40 = 0;
                                                                      				if (_v40 != 0) goto 0xbe5958c6;
                                                                      				if (E00007FF87FF8BE59D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xbe5958bc;
                                                                      				if (E00007FF87FF8BE59D2C0(1, _v64) == 0) goto 0xbe5958bc;
                                                                      				_t191 = _a32[5];
                                                                      				_v32 = _a32[5];
                                                                      				E00007FF87FF8BE595B30(_t112,  *((intOrPtr*)(_a8 + 0x28)),  &(_a32[2]));
                                                                      				E00007FF87FF8BE58C410(__ecx, E00007FF87FF8BE59D2C0(1, _v64), _v64, _a32[5], _v32);
                                                                      				goto 0xbe5958c1;
                                                                      				E00007FF87FF8BE58CF80(_t191);
                                                                      				goto 0xbe59595a;
                                                                      				if (E00007FF87FF8BE59D2C0(1,  *((intOrPtr*)(_a8 + 0x28))) == 0) goto 0xbe595955;
                                                                      				if (E00007FF87FF8BE59D2C0(1, _v64) == 0) goto 0xbe595955;
                                                                      				_t193 = _a32;
                                                                      				if ( *((intOrPtr*)(_t193 + 0x18)) == 0) goto 0xbe595919;
                                                                      				E00007FF87FF8BE58E6A0(_t117, _t193);
                                                                      				_v24 = _t193 + _a32[6];
                                                                      				goto 0xbe595922;
                                                                      				_v24 = 0;
                                                                      				if (E00007FF87FF8BE59D2F0(_v24) == 0) goto 0xbe595955;
                                                                      				_t195 = _a32;
                                                                      				if (( *_a32 & 0x00000004) == 0) goto 0xbe59594b;
                                                                      				_v72 = 2;
                                                                      				goto 0xbe595953;
                                                                      				_v72 = 1;
                                                                      				goto 0xbe59595a;
                                                                      				E00007FF87FF8BE58CF80(_a32);
                                                                      				E00007FF87FF8BE58CF50(_t195);
                                                                      				return _v72;
                                                                      			}




















                                                                      0x7ff8be5955f0
                                                                      0x7ff8be5955f5
                                                                      0x7ff8be5955fa
                                                                      0x7ff8be5955ff
                                                                      0x7ff8be595608
                                                                      0x7ff8be595610
                                                                      0x7ff8be59561c
                                                                      0x7ff8be59561e
                                                                      0x7ff8be595632
                                                                      0x7ff8be595637
                                                                      0x7ff8be595639
                                                                      0x7ff8be595648
                                                                      0x7ff8be59564a
                                                                      0x7ff8be595656
                                                                      0x7ff8be595658
                                                                      0x7ff8be59566c
                                                                      0x7ff8be595671
                                                                      0x7ff8be595673
                                                                      0x7ff8be595687
                                                                      0x7ff8be595695
                                                                      0x7ff8be5956a8
                                                                      0x7ff8be5956ac
                                                                      0x7ff8be5956c2
                                                                      0x7ff8be5956c9
                                                                      0x7ff8be5956ce
                                                                      0x7ff8be5956e4
                                                                      0x7ff8be5956f8
                                                                      0x7ff8be59570f
                                                                      0x7ff8be595722
                                                                      0x7ff8be595732
                                                                      0x7ff8be595744
                                                                      0x7ff8be59574c
                                                                      0x7ff8be595756
                                                                      0x7ff8be595759
                                                                      0x7ff8be59575b
                                                                      0x7ff8be595760
                                                                      0x7ff8be595774
                                                                      0x7ff8be59578f
                                                                      0x7ff8be5957a2
                                                                      0x7ff8be5957c1
                                                                      0x7ff8be5957d6
                                                                      0x7ff8be5957e1
                                                                      0x7ff8be5957f2
                                                                      0x7ff8be5957fa
                                                                      0x7ff8be595804
                                                                      0x7ff8be595807
                                                                      0x7ff8be595809
                                                                      0x7ff8be59580e
                                                                      0x7ff8be595813
                                                                      0x7ff8be59581f
                                                                      0x7ff8be595821
                                                                      0x7ff8be595835
                                                                      0x7ff8be59583a
                                                                      0x7ff8be59583c
                                                                      0x7ff8be59584b
                                                                      0x7ff8be595862
                                                                      0x7ff8be595875
                                                                      0x7ff8be59587f
                                                                      0x7ff8be595883
                                                                      0x7ff8be5958a0
                                                                      0x7ff8be5958b5
                                                                      0x7ff8be5958ba
                                                                      0x7ff8be5958bc
                                                                      0x7ff8be5958c1
                                                                      0x7ff8be5958db
                                                                      0x7ff8be5958ee
                                                                      0x7ff8be5958f0
                                                                      0x7ff8be5958fc
                                                                      0x7ff8be5958fe
                                                                      0x7ff8be595912
                                                                      0x7ff8be595917
                                                                      0x7ff8be595919
                                                                      0x7ff8be59592e
                                                                      0x7ff8be595930
                                                                      0x7ff8be59593f
                                                                      0x7ff8be595941
                                                                      0x7ff8be595949
                                                                      0x7ff8be59594b
                                                                      0x7ff8be595953
                                                                      0x7ff8be595955
                                                                      0x7ff8be59595c
                                                                      0x7ff8be59596a

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Validate$Read$Pointer_inconsistency$Adjust$DecodeExecuteterminate
                                                                      • String ID:
                                                                      • API String ID: 801082872-0
                                                                      • Opcode ID: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                                      • Instruction ID: 57d5aa672775e96a3cfbe3e74e1d31eb57ca920da7f329b0ee434de6f138659e
                                                                      • Opcode Fuzzy Hash: ac6deabe0a05852b742f22a1b4600818fc4e29af537fcfed8c9e1d4fbe1357d9
                                                                      • Instruction Fuzzy Hash: 84A12D36A0CA4686EB609B19E8A53BE67A0FBC4BD4F544031DB8D877A9DF3CD451CB10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtow_s
                                                                      • API String ID: 2123368286-1993839260
                                                                      • Opcode ID: 758167781a4fb66a58f740ebc537b1c9f8383254a932b9fe6e590f504f1f2882
                                                                      • Instruction ID: 3deb4cc620ef503e7a9e41987f11f4172c2dc45ec647afac8c8120b6bfa02289
                                                                      • Opcode Fuzzy Hash: 758167781a4fb66a58f740ebc537b1c9f8383254a932b9fe6e590f504f1f2882
                                                                      • Instruction Fuzzy Hash: 3AE14A76A1CB858EE7608B18E8643AAB7A5FB84384F101135E78D83BA9DF7DD444CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: $$2 <= radix && radix <= 36$buf != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\xtoa.c$length < sizeInTChars$sizeInTChars > (size_t)(is_neg ? 2 : 1)$sizeInTChars > 0$xtoa_s
                                                                      • API String ID: 2123368286-1853640030
                                                                      • Opcode ID: 820d6638ce8c2bc49aeb15d9bb45941f698caf6262644320b28b67af79be84a6
                                                                      • Instruction ID: 896a715433a280205ce6356ecb0f1be9186269b0047c8fc99f01e826db5a92f6
                                                                      • Opcode Fuzzy Hash: 820d6638ce8c2bc49aeb15d9bb45941f698caf6262644320b28b67af79be84a6
                                                                      • Instruction Fuzzy Hash: 17E14D76A1C785CEE7608B18E8643AAB7A5FB84384F401236E78D43BA9DF7DD444CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 22%
                                                                      			E00007FF87FF8BE59E6C6(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                                      				signed int _t224;
                                                                      				signed char _t229;
                                                                      				void* _t260;
                                                                      				intOrPtr _t268;
                                                                      				signed int _t342;
                                                                      				signed int _t343;
                                                                      				signed long long _t346;
                                                                      				intOrPtr* _t365;
                                                                      				intOrPtr* _t370;
                                                                      				signed long long _t400;
                                                                      
                                                                      				_t342 = __rax;
                                                                      				_a80 = _a80 | 0x00000040;
                                                                      				_a72 = 0xa;
                                                                      				_a72 = 0xa;
                                                                      				_a116 = 0x10;
                                                                      				asm("bts eax, 0xf");
                                                                      				_a1220 = 7;
                                                                      				_a1220 = 0x27;
                                                                      				_a72 = 0x10;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59e74d;
                                                                      				_a84 = 0x30;
                                                                      				_a86 = _a1220 + 0x51;
                                                                      				_a92 = 2;
                                                                      				_a72 = 8;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59e770;
                                                                      				asm("bts eax, 0x9");
                                                                      				if ((_a80 & 0x00008000) == 0) goto 0xbe59e797;
                                                                      				E00007FF87FF8BE591EA0( &_a1560);
                                                                      				_a1304 = _t342;
                                                                      				goto 0xbe59e844;
                                                                      				if ((_a80 & 0x00001000) == 0) goto 0xbe59e7be;
                                                                      				E00007FF87FF8BE591EA0( &_a1560);
                                                                      				_a1304 = _t342;
                                                                      				goto 0xbe59e844;
                                                                      				if ((_a80 & 0x00000020) == 0) goto 0xbe59e809;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59e7ef;
                                                                      				_t343 = E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t343;
                                                                      				goto 0xbe59e807;
                                                                      				E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t343;
                                                                      				goto 0xbe59e844;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59e82d;
                                                                      				E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t343;
                                                                      				goto 0xbe59e844;
                                                                      				E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t343;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59e87b;
                                                                      				if (_a1304 >= 0) goto 0xbe59e87b;
                                                                      				_a1312 =  ~_a1304;
                                                                      				asm("bts eax, 0x8");
                                                                      				goto 0xbe59e88b;
                                                                      				_t346 = _a1304;
                                                                      				_a1312 = _t346;
                                                                      				if ((_a80 & 0x00008000) != 0) goto 0xbe59e8c0;
                                                                      				if ((_a80 & 0x00001000) != 0) goto 0xbe59e8c0;
                                                                      				_a1312 = _a1312 & _t346;
                                                                      				if (_a116 >= 0) goto 0xbe59e8d1;
                                                                      				_a116 = 1;
                                                                      				goto 0xbe59e8ee;
                                                                      				_a80 = _a80 & 0xfffffff7;
                                                                      				if (_a116 - 0x200 <= 0) goto 0xbe59e8ee;
                                                                      				_a116 = 0x200;
                                                                      				if (_a1312 != 0) goto 0xbe59e901;
                                                                      				_a92 = 0;
                                                                      				_a64 =  &_a687;
                                                                      				_t224 = _a116;
                                                                      				_a116 = _a116 - 1;
                                                                      				if (_t224 > 0) goto 0xbe59e92f;
                                                                      				if (_a1312 == 0) goto 0xbe59e9cc;
                                                                      				_a1480 = _a72;
                                                                      				_a1296 = _t224 / _a1480 + 0x30;
                                                                      				_a1488 = _a72;
                                                                      				if (_a1296 - 0x39 <= 0) goto 0xbe59e9ab;
                                                                      				_t229 = _a1296 + _a1220;
                                                                      				_a1296 = _t229;
                                                                      				 *_a64 = _a1296 & 0x000000ff;
                                                                      				_a64 = _a64 - 1;
                                                                      				goto 0xbe59e90e;
                                                                      				_a104 = _t229;
                                                                      				_a64 = _a64 + 1;
                                                                      				if ((_a80 & 0x00000200) == 0) goto 0xbe59ea2a;
                                                                      				if (_a104 == 0) goto 0xbe59ea0b;
                                                                      				if ( *_a64 == 0x30) goto 0xbe59ea2a;
                                                                      				_a64 = _a64 - 1;
                                                                      				 *_a64 = 0x30;
                                                                      				_a104 = _a104 + 1;
                                                                      				if (_a108 != 0) goto 0xbe59ec7c;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59ea9d;
                                                                      				if ((_a80 & 0x00000100) == 0) goto 0xbe59ea61;
                                                                      				_a84 = 0x2d;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ea9d;
                                                                      				if ((_a80 & 0x00000001) == 0) goto 0xbe59ea80;
                                                                      				_a84 = 0x2b;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ea9d;
                                                                      				if ((_a80 & 0x00000002) == 0) goto 0xbe59ea9d;
                                                                      				_a84 = 0x20;
                                                                      				_a92 = 1;
                                                                      				_a1320 = _a88 - _a104 - _a92;
                                                                      				if ((_a80 & 0x0000000c) != 0) goto 0xbe59eadf;
                                                                      				E00007FF87FF8BE59EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                      				E00007FF87FF8BE59EF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                                      				if ((_a80 & 0x00000008) == 0) goto 0xbe59eb33;
                                                                      				if ((_a80 & 0x00000004) != 0) goto 0xbe59eb33;
                                                                      				E00007FF87FF8BE59EEC0(0x30, _a1320, _a1536,  &_a1200);
                                                                      				if (_a76 != 0) goto 0xbe59ec29;
                                                                      				if (_a104 <= 0) goto 0xbe59ec29;
                                                                      				_t365 = _a64;
                                                                      				_a1328 = _t365;
                                                                      				_a1336 = _a104;
                                                                      				_a1336 = _a1336 - 1;
                                                                      				if (_a1336 <= 0) goto 0xbe59ec27;
                                                                      				_t260 = E00007FF87FF8BE586840(_a1336,  &_a120);
                                                                      				_a1496 = _t365;
                                                                      				E00007FF87FF8BE586840(_t260,  &_a120);
                                                                      				_a1340 = E00007FF87FF8BE59F000( &_a1212, _a1328,  *((intOrPtr*)( *_t365 + 0x10c)), _a1496);
                                                                      				if (_a1340 > 0) goto 0xbe59ebe7;
                                                                      				_a1200 = 0xffffffff;
                                                                      				goto 0xbe59ec27;
                                                                      				E00007FF87FF8BE59EE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                                      				_a1328 = _a1328 + _a1340;
                                                                      				goto 0xbe59eb61;
                                                                      				goto 0xbe59ec47;
                                                                      				E00007FF87FF8BE59EF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                                      				if (_a1200 < 0) goto 0xbe59ec7c;
                                                                      				if ((_a80 & 0x00000004) == 0) goto 0xbe59ec7c;
                                                                      				E00007FF87FF8BE59EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                      				if (_a96 == 0) goto 0xbe59ec9c;
                                                                      				0xbe585330();
                                                                      				_a96 = 0;
                                                                      				goto 0xbe59da75;
                                                                      				if (_a1216 == 0) goto 0xbe59ecc2;
                                                                      				if (_a1216 == 7) goto 0xbe59ecc2;
                                                                      				_a1504 = 0;
                                                                      				goto 0xbe59eccd;
                                                                      				_a1504 = 1;
                                                                      				_t268 = _a1504;
                                                                      				_a1344 = _t268;
                                                                      				if (_a1344 != 0) goto 0xbe59ed13;
                                                                      				_t370 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                      				_a32 = _t370;
                                                                      				r9d = 0;
                                                                      				r8d = 0x8f5;
                                                                      				0xbe58b3b0();
                                                                      				if (_t268 != 1) goto 0xbe59ed13;
                                                                      				asm("int3");
                                                                      				if (_a1344 != 0) goto 0xbe59ed6f;
                                                                      				0xbe58ab30();
                                                                      				 *_t370 = 0x16;
                                                                      				_a32 = 0;
                                                                      				r9d = 0x8f5;
                                                                      				E00007FF87FF8BE58BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      				_a1376 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				goto 0xbe59ed8e;
                                                                      				_a1380 = _a1200;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				return E00007FF87FF8BE583280(_a1380, 2, 2, _a1512 ^ _t400, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      			}













                                                                      0x7ff8be59e6c6
                                                                      0x7ff8be59e6cd
                                                                      0x7ff8be59e6d1
                                                                      0x7ff8be59e6de
                                                                      0x7ff8be59e6eb
                                                                      0x7ff8be59e6f7
                                                                      0x7ff8be59e6ff
                                                                      0x7ff8be59e70c
                                                                      0x7ff8be59e717
                                                                      0x7ff8be59e72a
                                                                      0x7ff8be59e731
                                                                      0x7ff8be59e740
                                                                      0x7ff8be59e745
                                                                      0x7ff8be59e74f
                                                                      0x7ff8be59e762
                                                                      0x7ff8be59e768
                                                                      0x7ff8be59e77b
                                                                      0x7ff8be59e785
                                                                      0x7ff8be59e78a
                                                                      0x7ff8be59e792
                                                                      0x7ff8be59e7a2
                                                                      0x7ff8be59e7ac
                                                                      0x7ff8be59e7b1
                                                                      0x7ff8be59e7b9
                                                                      0x7ff8be59e7c7
                                                                      0x7ff8be59e7d2
                                                                      0x7ff8be59e7e1
                                                                      0x7ff8be59e7e5
                                                                      0x7ff8be59e7ed
                                                                      0x7ff8be59e7f7
                                                                      0x7ff8be59e7ff
                                                                      0x7ff8be59e807
                                                                      0x7ff8be59e812
                                                                      0x7ff8be59e81c
                                                                      0x7ff8be59e823
                                                                      0x7ff8be59e82b
                                                                      0x7ff8be59e835
                                                                      0x7ff8be59e83c
                                                                      0x7ff8be59e84d
                                                                      0x7ff8be59e858
                                                                      0x7ff8be59e865
                                                                      0x7ff8be59e871
                                                                      0x7ff8be59e879
                                                                      0x7ff8be59e87b
                                                                      0x7ff8be59e883
                                                                      0x7ff8be59e896
                                                                      0x7ff8be59e8a3
                                                                      0x7ff8be59e8b8
                                                                      0x7ff8be59e8c5
                                                                      0x7ff8be59e8c7
                                                                      0x7ff8be59e8cf
                                                                      0x7ff8be59e8d8
                                                                      0x7ff8be59e8e4
                                                                      0x7ff8be59e8e6
                                                                      0x7ff8be59e8f7
                                                                      0x7ff8be59e8f9
                                                                      0x7ff8be59e909
                                                                      0x7ff8be59e90e
                                                                      0x7ff8be59e918
                                                                      0x7ff8be59e91e
                                                                      0x7ff8be59e929
                                                                      0x7ff8be59e934
                                                                      0x7ff8be59e957
                                                                      0x7ff8be59e963
                                                                      0x7ff8be59e990
                                                                      0x7ff8be59e9a2
                                                                      0x7ff8be59e9a4
                                                                      0x7ff8be59e9b8
                                                                      0x7ff8be59e9c2
                                                                      0x7ff8be59e9c7
                                                                      0x7ff8be59e9d9
                                                                      0x7ff8be59e9e5
                                                                      0x7ff8be59e9f5
                                                                      0x7ff8be59e9fc
                                                                      0x7ff8be59ea09
                                                                      0x7ff8be59ea13
                                                                      0x7ff8be59ea1d
                                                                      0x7ff8be59ea26
                                                                      0x7ff8be59ea2f
                                                                      0x7ff8be59ea3e
                                                                      0x7ff8be59ea4b
                                                                      0x7ff8be59ea52
                                                                      0x7ff8be59ea57
                                                                      0x7ff8be59ea5f
                                                                      0x7ff8be59ea6a
                                                                      0x7ff8be59ea71
                                                                      0x7ff8be59ea76
                                                                      0x7ff8be59ea7e
                                                                      0x7ff8be59ea89
                                                                      0x7ff8be59ea90
                                                                      0x7ff8be59ea95
                                                                      0x7ff8be59eaad
                                                                      0x7ff8be59eabd
                                                                      0x7ff8be59eada
                                                                      0x7ff8be59eaf8
                                                                      0x7ff8be59eb06
                                                                      0x7ff8be59eb11
                                                                      0x7ff8be59eb2e
                                                                      0x7ff8be59eb38
                                                                      0x7ff8be59eb43
                                                                      0x7ff8be59eb49
                                                                      0x7ff8be59eb4e
                                                                      0x7ff8be59eb5a
                                                                      0x7ff8be59eb71
                                                                      0x7ff8be59eb7a
                                                                      0x7ff8be59eb85
                                                                      0x7ff8be59eb8a
                                                                      0x7ff8be59eb97
                                                                      0x7ff8be59ebc9
                                                                      0x7ff8be59ebd8
                                                                      0x7ff8be59ebda
                                                                      0x7ff8be59ebe5
                                                                      0x7ff8be59ebff
                                                                      0x7ff8be59ec1a
                                                                      0x7ff8be59ec22
                                                                      0x7ff8be59ec27
                                                                      0x7ff8be59ec42
                                                                      0x7ff8be59ec4f
                                                                      0x7ff8be59ec5a
                                                                      0x7ff8be59ec77
                                                                      0x7ff8be59ec82
                                                                      0x7ff8be59ec8e
                                                                      0x7ff8be59ec93
                                                                      0x7ff8be59ec9c
                                                                      0x7ff8be59eca9
                                                                      0x7ff8be59ecb3
                                                                      0x7ff8be59ecb5
                                                                      0x7ff8be59ecc0
                                                                      0x7ff8be59ecc2
                                                                      0x7ff8be59eccd
                                                                      0x7ff8be59ecd4
                                                                      0x7ff8be59ece3
                                                                      0x7ff8be59ece5
                                                                      0x7ff8be59ecec
                                                                      0x7ff8be59ecf1
                                                                      0x7ff8be59ecf4
                                                                      0x7ff8be59ed06
                                                                      0x7ff8be59ed0e
                                                                      0x7ff8be59ed10
                                                                      0x7ff8be59ed1b
                                                                      0x7ff8be59ed1d
                                                                      0x7ff8be59ed22
                                                                      0x7ff8be59ed28
                                                                      0x7ff8be59ed31
                                                                      0x7ff8be59ed4c
                                                                      0x7ff8be59ed51
                                                                      0x7ff8be59ed61
                                                                      0x7ff8be59ed6d
                                                                      0x7ff8be59ed76
                                                                      0x7ff8be59ed82
                                                                      0x7ff8be59eda5

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$9$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 1967237116-1983305044
                                                                      • Opcode ID: 39c1530eb87c93b5c15807e3225054cbc2f74160d6d1f03a50421518d7a029c2
                                                                      • Instruction ID: 168fef560b36d7f8b0b1e6451268fc3a6604ac03e14b4112f17682d19a74333a
                                                                      • Opcode Fuzzy Hash: 39c1530eb87c93b5c15807e3225054cbc2f74160d6d1f03a50421518d7a029c2
                                                                      • Instruction Fuzzy Hash: 51F1D47690CAC58AE7708B59E8553EBB7E0EB84391F100135E78987A99EF7CE480CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$wcscat_s
                                                                      • API String ID: 2123368286-3477667311
                                                                      • Opcode ID: 5284e54803fa5a35f276e18858076b29593f150ab8ed8022a36a7ce25e0bf2f4
                                                                      • Instruction ID: e2966c20afbb0657f19eaaf5fcb04f05a76e8ef390c174d4e512658e245e775c
                                                                      • Opcode Fuzzy Hash: 5284e54803fa5a35f276e18858076b29593f150ab8ed8022a36a7ce25e0bf2f4
                                                                      • Instruction Fuzzy Hash: 6FF10935A1CB8689EBB08B19E8643BA63A4FB857D4F105135D79E83BA4DF3CD485CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$(L"String is not null terminated" && 0)$Buffer is too small$String is not null terminated$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscat_s.inl$strcat_s
                                                                      • API String ID: 2123368286-1420200500
                                                                      • Opcode ID: cc07cef64c5b8afb013f442fd59d1430f3c77c8b5aa073aebe04f881c7874d42
                                                                      • Instruction ID: 74f4ae899a3e46b443e7231105066ae03bdcaccbd438d3b1e3667f4d589cb948
                                                                      • Opcode Fuzzy Hash: cc07cef64c5b8afb013f442fd59d1430f3c77c8b5aa073aebe04f881c7874d42
                                                                      • Instruction Fuzzy Hash: 54F11B35A0CB868DEBB08B18E8643AA67A4FB857D4F105235D79D43BE8DF7CD4488B01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_argwctomb_s
                                                                      • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2560055391-3497434347
                                                                      • Opcode ID: 667eef7f1f49c1d82be4abe5f7b2b6c0360aabec3e49fa9d9e3a648fddbc0f41
                                                                      • Instruction ID: 631d6432045b76598d235c957559df9be5947bc616c0f25a7449eb91b66593b6
                                                                      • Opcode Fuzzy Hash: 667eef7f1f49c1d82be4abe5f7b2b6c0360aabec3e49fa9d9e3a648fddbc0f41
                                                                      • Instruction Fuzzy Hash: 53C1087690C7C68AE771CB18E8653EAB7A4FB84784F400135E79986A99DF7CE540CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __doserrno$_invalid_parameter
                                                                      • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_lseeki64$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                                      • API String ID: 747159061-1442092225
                                                                      • Opcode ID: 14faf06f4b776b3818928093306a4898f737286e5044e20a730c767404cf7ae4
                                                                      • Instruction ID: c05bd3b66d666cb2fbd00207e945cfb2e73ec565eb168a95543a843f93332236
                                                                      • Opcode Fuzzy Hash: 14faf06f4b776b3818928093306a4898f737286e5044e20a730c767404cf7ae4
                                                                      • Instruction Fuzzy Hash: 67614B75A1CA468EE7609B28EC613AA73A5FB803E4F505335E7AD466D6DF3CE540CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _exit_invoke_watson_if_error_invoke_watson_if_oneof
                                                                      • String ID: Module: $(*_errno())$...$Debug %s!Program: %s%s%s%s%s%s%s%s%s%s%s%s(Press Retry to debug the application)$Microsoft Visual C++ Debug Library$_CrtDbgReport: String too long or IO Error$__crtMessageWindowA$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgrpt.c$strcpy_s(szOutMessage, 4096, "_CrtDbgReport: String too long or IO Error")
                                                                      • API String ID: 1778837556-2487400587
                                                                      • Opcode ID: 1725f90675b356b8c96096f206fe05692ea700145f07fa5ff60a00d667238266
                                                                      • Instruction ID: bef96e60dce16eec581cc3ce362f8d6395ed9787bc56f685065278371d5d98d3
                                                                      • Opcode Fuzzy Hash: 1725f90675b356b8c96096f206fe05692ea700145f07fa5ff60a00d667238266
                                                                      • Instruction Fuzzy Hash: 9B51D57650CAC199E734CB09E8A03EAB3A5FB983D4F405135EB9D46AAADF3CD154CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameterwctomb_s
                                                                      • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 83251219-3442986447
                                                                      • Opcode ID: a7736ae2d77719cf8dd033ea8b01e94f48993e2d03ef0b45187a851eb092d1a4
                                                                      • Instruction ID: 592e99dece6d96282381124e2123675b2878982bdb6efd02612d84a2dfaa0336
                                                                      • Opcode Fuzzy Hash: a7736ae2d77719cf8dd033ea8b01e94f48993e2d03ef0b45187a851eb092d1a4
                                                                      • Instruction Fuzzy Hash: 9DF1D67690CAC18AE771CB19E8A43AAB7A4F784784F540136E79D86A99DF7CD540CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(filedes) & FOPEN)$(filedes >= 0 && (unsigned)filedes < (unsigned)_nhandle)$_commit$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\commit.c
                                                                      • API String ID: 2123368286-2816485415
                                                                      • Opcode ID: a09a08489fcfa17bf46b80f7bccdd7250e5da7b82fa925d7c8e71ba256914943
                                                                      • Instruction ID: 264c25eaae0c6705d7b2b702858d54aaef944455f0409228a5c13f911c4d31ee
                                                                      • Opcode Fuzzy Hash: a09a08489fcfa17bf46b80f7bccdd7250e5da7b82fa925d7c8e71ba256914943
                                                                      • Instruction Fuzzy Hash: 70614B72A2C6468EE7609F28EC6477A73A1FB80394F406235E75E476D5DF7CE8408B50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __doserrno$_invalid_parameter
                                                                      • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$(_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_close$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\close.c
                                                                      • API String ID: 747159061-2992490823
                                                                      • Opcode ID: 31e6f22f94a5a332f8c1da309800fd96aa675ce4ff76475566f44e9374f3c210
                                                                      • Instruction ID: f87076bbe84c662c207fa73d9309f0da403d8fc5448745a37722c1242cdfa555
                                                                      • Opcode Fuzzy Hash: 31e6f22f94a5a332f8c1da309800fd96aa675ce4ff76475566f44e9374f3c210
                                                                      • Instruction Fuzzy Hash: 7E513D71A2C6468EE7609B28ECB176A77A1FB803D4F506235E39A476D6DF7CE4408B10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _calloc_dbg$InfoStartup_calloc_dbg_impl
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                                      • API String ID: 1930727954-3864165772
                                                                      • Opcode ID: 1e1da01118203e5de71fbaaff93707c72c49baac5ee22ac4dcecfbd271a6fe22
                                                                      • Instruction ID: 2b25385330ec996d081d0def07363f8bb90539762651ac244d1d1623845807ac
                                                                      • Opcode Fuzzy Hash: 1e1da01118203e5de71fbaaff93707c72c49baac5ee22ac4dcecfbd271a6fe22
                                                                      • Instruction Fuzzy Hash: DDF1F32260DBC5C9E7708B19E89076AB7A4F785BA4F104226CBAD87BE5DF3CD445CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__get_printf_count_output_invalid_parameterget_int64_arg
                                                                      • String ID: ("'n' format specifier disabled", 0)$("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 1328470723-1899493600
                                                                      • Opcode ID: 66637f3263954389c4faca3e64166f48d89120a2e65f09c6e12548c2e7ae54a3
                                                                      • Instruction ID: 1515c073b4e2325ae079311c46f84d73596f1dc05e8c2db5d905002c5ff7d793
                                                                      • Opcode Fuzzy Hash: 66637f3263954389c4faca3e64166f48d89120a2e65f09c6e12548c2e7ae54a3
                                                                      • Instruction Fuzzy Hash: 8DC10E7690CAC28AE7709B19E8657EBB7A0FB84395F400135D79987A99DF7CE480CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocaMarkStringmalloc
                                                                      • String ID:
                                                                      • API String ID: 2352934578-0
                                                                      • Opcode ID: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                                      • Instruction ID: bbc9c98391f967a8d12b0a40c03e0611b3f56a0d82a154296a9e90850984d53b
                                                                      • Opcode Fuzzy Hash: c62487d166d7dca86c557c7a35fedf321effa742b468bc4a62d127ec3f3969a5
                                                                      • Instruction Fuzzy Hash: 20B10436A0C785CAE760CB19F85436AB7A0FB88794F100235E7AA43B99DF7CE4449F50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcsncpy_s.inl$wcsncpy_s
                                                                      • API String ID: 2123368286-322314505
                                                                      • Opcode ID: 399a9458fa01abea37a4ed0ff3a6319967a0ea4a6e471ce5995f41885ca75c61
                                                                      • Instruction ID: 0c641e022c3e2915f6806d5d3b59b5e8a77777c36e6373725901a1cd71224b4e
                                                                      • Opcode Fuzzy Hash: 399a9458fa01abea37a4ed0ff3a6319967a0ea4a6e471ce5995f41885ca75c61
                                                                      • Instruction Fuzzy Hash: 98021B35A0CB86C9EAB09B18E8643AA63A0FBC57D5F105635D79E83BE5DF3CD4448B01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: DecodePointer$Locale$UpdateUpdate::~__invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 1139040907-3988320827
                                                                      • Opcode ID: 2dc7b4f9e3ef16c46f4c156222616883407f9e483511c99d0d30e534b880734d
                                                                      • Instruction ID: fe2dee792d70cb4fbc138c89c28eac43ac91f50b5063b839a859a332872fa6e4
                                                                      • Opcode Fuzzy Hash: 2dc7b4f9e3ef16c46f4c156222616883407f9e483511c99d0d30e534b880734d
                                                                      • Instruction Fuzzy Hash: ABF1C97690CA818AE7708B19E8553ABB7E1FB85795F100136E78D87A99DF7CE480CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInWords)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$wcscpy_s
                                                                      • API String ID: 2123368286-3300880850
                                                                      • Opcode ID: 5aefbc8f1d73eb7cfc6612018eacf67af3b13798598c0c57764cabda027a92b3
                                                                      • Instruction ID: 47c4dfa581ee8eb7cbecb148cf87685cadb98d75294e70f2c565fe1f707354a2
                                                                      • Opcode Fuzzy Hash: 5aefbc8f1d73eb7cfc6612018eacf67af3b13798598c0c57764cabda027a92b3
                                                                      • Instruction Fuzzy Hash: B4C13C35A0CB9689EBB08B28E9643BA73A0FB857D4F505135D79D43BA9DF7CD4448B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (((_Src))) != NULL$((_Dst)) != NULL && ((_SizeInBytes)) > 0$(L"Buffer is too small" && 0)$Buffer is too small$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\tcscpy_s.inl$strcpy_s
                                                                      • API String ID: 2123368286-3045918802
                                                                      • Opcode ID: 3a73121abd8cd92c4d24009a6c05b63160c008938b58f8c852a28b4bc1f5a78a
                                                                      • Instruction ID: f8884d829b1460a86238e848257f0b28750eaceeed5db1e983c057ce2d3d4fbe
                                                                      • Opcode Fuzzy Hash: 3a73121abd8cd92c4d24009a6c05b63160c008938b58f8c852a28b4bc1f5a78a
                                                                      • Instruction Fuzzy Hash: E3C14F7190CB8A89EBB08B19E86437AA3E4F7857D4F504136D7AD43BAADF3CD4448B10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 15%
                                                                      			E00007FF87FF8BE59F000(long long __rcx, signed char* __rdx, long long __r8, long long __r9, long long _a8, signed char* _a16, long long _a24, long long _a32) {
                                                                      				intOrPtr _v24;
                                                                      				long long _v32;
                                                                      				intOrPtr _v36;
                                                                      				intOrPtr _v40;
                                                                      				intOrPtr _v44;
                                                                      				intOrPtr _v48;
                                                                      				intOrPtr _v52;
                                                                      				intOrPtr _v56;
                                                                      				char _v88;
                                                                      				intOrPtr _v96;
                                                                      				long long _v104;
                                                                      				void* _t80;
                                                                      				void* _t81;
                                                                      				void* _t89;
                                                                      				void* _t92;
                                                                      				intOrPtr _t102;
                                                                      				intOrPtr* _t136;
                                                                      				intOrPtr* _t137;
                                                                      				intOrPtr* _t139;
                                                                      				signed char* _t141;
                                                                      				intOrPtr* _t142;
                                                                      				intOrPtr* _t143;
                                                                      				intOrPtr* _t144;
                                                                      				intOrPtr* _t148;
                                                                      				intOrPtr* _t149;
                                                                      
                                                                      				_a32 = __r9;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __rcx;
                                                                      				if (_a16 == 0) goto 0xbe59f031;
                                                                      				if (_a24 != 0) goto 0xbe59f038;
                                                                      				goto 0xbe59f31a;
                                                                      				_t136 = _a16;
                                                                      				if ( *_t136 != 0) goto 0xbe59f066;
                                                                      				if (_a8 == 0) goto 0xbe59f05f;
                                                                      				 *_a8 = 0;
                                                                      				goto 0xbe59f31a;
                                                                      				0xbe5866b0();
                                                                      				_t80 = E00007FF87FF8BE586840(0,  &_v88);
                                                                      				_t137 =  *_t136;
                                                                      				if ( *((intOrPtr*)(_t137 + 0x10c)) == 1) goto 0xbe59f0d2;
                                                                      				_t81 = E00007FF87FF8BE586840(_t80,  &_v88);
                                                                      				if ( *((intOrPtr*)( *_t137 + 0x10c)) == 2) goto 0xbe59f0d2;
                                                                      				_t139 = L"_loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2";
                                                                      				_v104 = _t139;
                                                                      				r9d = 0;
                                                                      				r8d = 0x47;
                                                                      				0xbe58b3b0();
                                                                      				if (_t81 != 1) goto 0xbe59f0d2;
                                                                      				asm("int3");
                                                                      				E00007FF87FF8BE586840(0,  &_v88);
                                                                      				if ( *((intOrPtr*)( *_t139 + 0x14)) != 0) goto 0xbe59f121;
                                                                      				if (_a8 == 0) goto 0xbe59f106;
                                                                      				_t141 = _a16;
                                                                      				 *_a8 =  *_t141 & 0x000000ff;
                                                                      				_v56 = 1;
                                                                      				E00007FF87FF8BE586800( &_v88);
                                                                      				goto 0xbe59f31a;
                                                                      				E00007FF87FF8BE586840(_v56,  &_v88);
                                                                      				if (E00007FF87FF8BE592B90( *_a16 & 0x000000ff, _t141, _t141) == 0) goto 0xbe59f276;
                                                                      				_t89 = E00007FF87FF8BE586840(_t88,  &_v88);
                                                                      				_t142 =  *_t141;
                                                                      				if ( *((intOrPtr*)(_t142 + 0x10c)) - 1 <= 0) goto 0xbe59f1f3;
                                                                      				E00007FF87FF8BE586840(_t89,  &_v88);
                                                                      				_t143 =  *_t142;
                                                                      				if (_a24 -  *((intOrPtr*)(_t143 + 0x10c)) < 0) goto 0xbe59f1f3;
                                                                      				if (_a8 == 0) goto 0xbe59f191;
                                                                      				_v36 = 1;
                                                                      				goto 0xbe59f199;
                                                                      				_v36 = 0;
                                                                      				_t92 = E00007FF87FF8BE586840( *((intOrPtr*)(_t143 + 0x10c)),  &_v88);
                                                                      				_t144 =  *_t143;
                                                                      				_v32 = _t144;
                                                                      				E00007FF87FF8BE586840(_t92,  &_v88);
                                                                      				_v96 = _v36;
                                                                      				_v104 = _a8;
                                                                      				r9d =  *((intOrPtr*)(_v32 + 0x10c));
                                                                      				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0xbe59f247;
                                                                      				E00007FF87FF8BE586840(_t94,  &_v88);
                                                                      				if (_a24 -  *((intOrPtr*)( *((intOrPtr*)( *_t144)) + 0x10c)) < 0) goto 0xbe59f221;
                                                                      				_t148 = _a16;
                                                                      				if ( *((char*)(_t148 + 1)) != 0) goto 0xbe59f247;
                                                                      				0xbe58ab30();
                                                                      				 *_t148 = 0x2a;
                                                                      				_v52 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_v88);
                                                                      				goto 0xbe59f31a;
                                                                      				E00007FF87FF8BE586840(_v52,  &_v88);
                                                                      				_t149 =  *_t148;
                                                                      				_v48 =  *((intOrPtr*)(_t149 + 0x10c));
                                                                      				E00007FF87FF8BE586800( &_v88);
                                                                      				_t102 = _v48;
                                                                      				goto 0xbe59f310;
                                                                      				if (_a8 == 0) goto 0xbe59f28b;
                                                                      				_v24 = 1;
                                                                      				goto 0xbe59f293;
                                                                      				_v24 = 0;
                                                                      				E00007FF87FF8BE586840(_t102,  &_v88);
                                                                      				_v96 = _v24;
                                                                      				_v104 = _a8;
                                                                      				r9d = 1;
                                                                      				if (MultiByteToWideChar(??, ??, ??, ??, ??, ??) != 0) goto 0xbe59f2f8;
                                                                      				0xbe58ab30();
                                                                      				 *((intOrPtr*)( *_t149)) = 0x2a;
                                                                      				_v44 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_v88);
                                                                      				goto 0xbe59f31a;
                                                                      				_v40 = 1;
                                                                      				E00007FF87FF8BE586800( &_v88);
                                                                      				goto 0xbe59f31a;
                                                                      				return E00007FF87FF8BE586800( &_v88);
                                                                      			}




























                                                                      0x7ff8be59f000
                                                                      0x7ff8be59f005
                                                                      0x7ff8be59f00a
                                                                      0x7ff8be59f00f
                                                                      0x7ff8be59f024
                                                                      0x7ff8be59f02f
                                                                      0x7ff8be59f033
                                                                      0x7ff8be59f038
                                                                      0x7ff8be59f045
                                                                      0x7ff8be59f050
                                                                      0x7ff8be59f05c
                                                                      0x7ff8be59f061
                                                                      0x7ff8be59f073
                                                                      0x7ff8be59f07d
                                                                      0x7ff8be59f082
                                                                      0x7ff8be59f08c
                                                                      0x7ff8be59f093
                                                                      0x7ff8be59f0a2
                                                                      0x7ff8be59f0a4
                                                                      0x7ff8be59f0ab
                                                                      0x7ff8be59f0b0
                                                                      0x7ff8be59f0b3
                                                                      0x7ff8be59f0c5
                                                                      0x7ff8be59f0cd
                                                                      0x7ff8be59f0cf
                                                                      0x7ff8be59f0d7
                                                                      0x7ff8be59f0e3
                                                                      0x7ff8be59f0ee
                                                                      0x7ff8be59f0f0
                                                                      0x7ff8be59f103
                                                                      0x7ff8be59f106
                                                                      0x7ff8be59f113
                                                                      0x7ff8be59f11c
                                                                      0x7ff8be59f126
                                                                      0x7ff8be59f140
                                                                      0x7ff8be59f14b
                                                                      0x7ff8be59f150
                                                                      0x7ff8be59f15a
                                                                      0x7ff8be59f165
                                                                      0x7ff8be59f16a
                                                                      0x7ff8be59f17a
                                                                      0x7ff8be59f185
                                                                      0x7ff8be59f187
                                                                      0x7ff8be59f18f
                                                                      0x7ff8be59f191
                                                                      0x7ff8be59f19e
                                                                      0x7ff8be59f1a3
                                                                      0x7ff8be59f1a6
                                                                      0x7ff8be59f1b0
                                                                      0x7ff8be59f1bc
                                                                      0x7ff8be59f1c8
                                                                      0x7ff8be59f1d2
                                                                      0x7ff8be59f1f1
                                                                      0x7ff8be59f1f8
                                                                      0x7ff8be59f20f
                                                                      0x7ff8be59f211
                                                                      0x7ff8be59f21f
                                                                      0x7ff8be59f221
                                                                      0x7ff8be59f226
                                                                      0x7ff8be59f22c
                                                                      0x7ff8be59f239
                                                                      0x7ff8be59f242
                                                                      0x7ff8be59f24c
                                                                      0x7ff8be59f251
                                                                      0x7ff8be59f25a
                                                                      0x7ff8be59f263
                                                                      0x7ff8be59f268
                                                                      0x7ff8be59f271
                                                                      0x7ff8be59f27f
                                                                      0x7ff8be59f281
                                                                      0x7ff8be59f289
                                                                      0x7ff8be59f28b
                                                                      0x7ff8be59f298
                                                                      0x7ff8be59f2a4
                                                                      0x7ff8be59f2b0
                                                                      0x7ff8be59f2b5
                                                                      0x7ff8be59f2d3
                                                                      0x7ff8be59f2d5
                                                                      0x7ff8be59f2da
                                                                      0x7ff8be59f2e0
                                                                      0x7ff8be59f2ed
                                                                      0x7ff8be59f2f6
                                                                      0x7ff8be59f2f8
                                                                      0x7ff8be59f305
                                                                      0x7ff8be59f30e
                                                                      0x7ff8be59f321

                                                                      APIs
                                                                      Strings
                                                                      • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c, xrefs: 00007FF8BE59F0B9
                                                                      • _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2, xrefs: 00007FF8BE59F0A4
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$ByteCharMultiWide
                                                                      • String ID: _loc_update.GetLocaleT()->locinfo->mb_cur_max == 1 || _loc_update.GetLocaleT()->locinfo->mb_cur_max == 2$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\mbtowc.c
                                                                      • API String ID: 3162172745-1617866167
                                                                      • Opcode ID: c1274c363911339d648a95bedd1909bdcc319eff7e23c8a9712c300a8ba53b59
                                                                      • Instruction ID: 9b860b120b455bff2abfdad83959b79223fdbd46c3f4ae99875c9b78bcc2bea1
                                                                      • Opcode Fuzzy Hash: c1274c363911339d648a95bedd1909bdcc319eff7e23c8a9712c300a8ba53b59
                                                                      • Instruction Fuzzy Hash: 38911936A1C6818AEB60DB58E8603BAB7A0FB80B84F404135E79E83796DF7CD444DB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invoke_watson_if_oneof_swprintf_p
                                                                      • String ID: $ Data: <%s> %s$%.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                      • API String ID: 792801276-1329727594
                                                                      • Opcode ID: 607a4edc1d8635394f44f6361f5afd02e99ede9dffc913f916da5ff8546dd257
                                                                      • Instruction ID: 15577972f40a58e00c66c1bbdd1363893b6626e01dcd891ccc5ff2f3e2c60c59
                                                                      • Opcode Fuzzy Hash: 607a4edc1d8635394f44f6361f5afd02e99ede9dffc913f916da5ff8546dd257
                                                                      • Instruction Fuzzy Hash: 7D610572A0D6C18AE7749B55E8A17AABBA0FB84780F504136D7DD47B9ADF7CD404CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __doserrno$_invalid_parameter
                                                                      • String ID: (_osfile(fh) & FOPEN)$(fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_get_osfhandle$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\osfinfo.c
                                                                      • API String ID: 747159061-3177431134
                                                                      • Opcode ID: 733470a45f5ff35a9cc2dbc2e65958217baa720b2ccc02f46ae502d5c05be40f
                                                                      • Instruction ID: 47262dd92509298b207bdc1fcf0c8831a5d198a3322a16f0e4d81a1bb041bc83
                                                                      • Opcode Fuzzy Hash: 733470a45f5ff35a9cc2dbc2e65958217baa720b2ccc02f46ae502d5c05be40f
                                                                      • Instruction Fuzzy Hash: 0E517B31A1C6468EE7609B58ECA43B973A1FB843E4F406331E7AD0A6D5DF7CE5408B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocH_enabledSize_invalid_parameter_is_
                                                                      • String ID: _expand_base$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\expand.c$pBlock != NULL
                                                                      • API String ID: 1608253119-1427866139
                                                                      • Opcode ID: 6d96cea77955d8bb906b6453695997b0a193914bba0a0a822ab5dc7dadfec49f
                                                                      • Instruction ID: 989a50dc60b6410a948d04e675d141dc45cdd075660bfff1e19e935b4fcc4032
                                                                      • Opcode Fuzzy Hash: 6d96cea77955d8bb906b6453695997b0a193914bba0a0a822ab5dc7dadfec49f
                                                                      • Instruction Fuzzy Hash: 86418E3590CB468AF7A09B58F86536A73A4FB847C0F501535E79D43AAACF3DE444CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Buffer too small", 0)$_vsnwprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c$format != NULL$string != NULL && sizeInWords > 0
                                                                      • API String ID: 2123368286-2958264153
                                                                      • Opcode ID: 54e27a84bf50c775cab06d8b5edff0f5a952963ad436725320079f8e266d75c3
                                                                      • Instruction ID: 079a4c13c998c2ccb0ef692a44c41ed609bfa1ac24e12f988824f795404ae8f8
                                                                      • Opcode Fuzzy Hash: 54e27a84bf50c775cab06d8b5edff0f5a952963ad436725320079f8e266d75c3
                                                                      • Instruction Fuzzy Hash: 59E12C3591CA868EE6B09B28E8643EA73A0FB857A4F105235E7AD47BD5DF3CD444CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$-$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 1967237116-569934968
                                                                      • Opcode ID: cc230896d9a9b78453caf74913fa4f6c5025a346ba52c0faae240e43dd1109e8
                                                                      • Instruction ID: d68bf203adf2c579e353f5b57799c4389ae69a8f9e4b8d75712738f924b02197
                                                                      • Opcode Fuzzy Hash: cc230896d9a9b78453caf74913fa4f6c5025a346ba52c0faae240e43dd1109e8
                                                                      • Instruction Fuzzy Hash: E1D1187650CBC68AE771CB18E8A43EAB7A4F784784F140135EB9986A99DF7CE540CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 100%
                                                                      			E00007FF87FF8BE59BFDE(char _a696, char _a976) {
                                                                      
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}



                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: wctomb_s
                                                                      • String ID: $("Incorrect format specifier", 0)$7$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2215178078-1895985292
                                                                      • Opcode ID: 328cc2888182d49a31844c3056f2ccb27a85ea43ad5a4f85c1908e4795749c83
                                                                      • Instruction ID: 9c9c63d7ec68571b5498a79ad5198c16862de0e0176c5daf7978d4ac471d65d3
                                                                      • Opcode Fuzzy Hash: 328cc2888182d49a31844c3056f2ccb27a85ea43ad5a4f85c1908e4795749c83
                                                                      • Instruction Fuzzy Hash: E6B1277690C7C28AE771CB18E8A53EEB7A4F784784F440136E79986A99DB7CE540CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Buffer too small", 0)$_vsprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL$string != NULL && sizeInBytes > 0
                                                                      • API String ID: 2123368286-348877268
                                                                      • Opcode ID: b6bbebb1f4d85d28a6809bfbee2de0be140824b02a8ca1d2541b9b7cfc6d5eb8
                                                                      • Instruction ID: 17c40e4fc4cb6cf2c6b52a797f0bc831ee991868c60574233cc9dc4efd0ab4df
                                                                      • Opcode Fuzzy Hash: b6bbebb1f4d85d28a6809bfbee2de0be140824b02a8ca1d2541b9b7cfc6d5eb8
                                                                      • Instruction Fuzzy Hash: 8D914C3991CA468EEB608B18F8643AA77A4FB843D4F501235E7AD47AE9DF7CD4448B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$(ch != _T('\0'))$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-4087627024
                                                                      • Opcode ID: 957d201a7f975e21043e4e8cb8b7cb2b2c46c9e35bbf440868bf758d6fc38531
                                                                      • Instruction ID: b03be03dd9a30e5f59ee13fc9d3396adf09cf656ea3e4d9a5439a54759d4460e
                                                                      • Opcode Fuzzy Hash: 957d201a7f975e21043e4e8cb8b7cb2b2c46c9e35bbf440868bf758d6fc38531
                                                                      • Instruction Fuzzy Hash: 59711C6690C6C28AE7B19B28E8A43FE77A4EB84384F401136D7DD8669ADF3CD541CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: dst != NULL$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\memcpy_s.c$memcpy_s$sizeInBytes >= count$src != NULL
                                                                      • API String ID: 2123368286-3692278645
                                                                      • Opcode ID: 401d9823d412221fb6395ed79c47aff3affb5440d9467cb4f29d8a138cee4ba4
                                                                      • Instruction ID: f87ca46838f3f135678595e4590c9013f58f473d7d4cff40ad59fcded7a70104
                                                                      • Opcode Fuzzy Hash: 401d9823d412221fb6395ed79c47aff3affb5440d9467cb4f29d8a138cee4ba4
                                                                      • Instruction Fuzzy Hash: E5517135A1C6928AFB609B58ED643AA77A1FF803C4F502135E78D436A9DFBDE544CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _free_base_malloc_base
                                                                      • String ID:
                                                                      • API String ID: 3824334587-0
                                                                      • Opcode ID: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                                      • Instruction ID: b4b8d433fb1ae4eab5be592edf6005f2eaaf73ae707c1ca9bb09a696b5de0e29
                                                                      • Opcode Fuzzy Hash: f253414e3849525c296ec210365ea501a1b810d2bb56cf35f247e52024ae0b7b
                                                                      • Instruction Fuzzy Hash: 9E311E3590C642C9E7A09B68E87437EA7A5FB843D4F100235E7EE46697CF7CE4808B01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: Bad memory block found at 0x%p.$Bad memory block found at 0x%p.Memory allocated at %hs(%d).$_CrtMemCheckpoint$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$state != NULL
                                                                      • API String ID: 2123368286-817335350
                                                                      • Opcode ID: 79c801832210f02bb2549a70f13a14fc678dbb47873921c6f453ebac8324fa6a
                                                                      • Instruction ID: c64979b78ba6ae0eb34906b6b906035ff0d92e14c32120dd14c1cea1663d36be
                                                                      • Opcode Fuzzy Hash: 79c801832210f02bb2549a70f13a14fc678dbb47873921c6f453ebac8324fa6a
                                                                      • Instruction Fuzzy Hash: 72610F36A1CB458AEB20CB1DE8A132A77A0FB85794F205135EB9D43BA5CF7DD445CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 100%
                                                                      			E00007FF87FF8BE58CFF0(intOrPtr _a8) {
                                                                      				intOrPtr _v24;
                                                                      				long long _v48;
                                                                      				long long _v64;
                                                                      				intOrPtr _t21;
                                                                      
                                                                      				_a8 = _t21;
                                                                      				_v48 = 0;
                                                                      				_v64 = 0;
                                                                      				_v24 = _a8;
                                                                      				_v24 = _v24 - 2;
                                                                      				if (_v24 - 0x14 > 0) goto 0xbe58d13e;
                                                                      				goto __rax;
                                                                      			}







                                                                      0x7ff8be58cff0
                                                                      0x7ff8be58cff8
                                                                      0x7ff8be58d000
                                                                      0x7ff8be58d010
                                                                      0x7ff8be58d01b
                                                                      0x7ff8be58d024
                                                                      0x7ff8be58d048

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Invalid signal or error", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\winsig.c$raise
                                                                      • API String ID: 2123368286-2245755083
                                                                      • Opcode ID: ea92073534654960e4773f731c7ed7de4444a26fa1832afe31598046f11c2526
                                                                      • Instruction ID: 15eb2267d26b30e1acd14bf7781f7d92fa88252fa7ae65cc5ca4a3b0fae2edae
                                                                      • Opcode Fuzzy Hash: ea92073534654960e4773f731c7ed7de4444a26fa1832afe31598046f11c2526
                                                                      • Instruction Fuzzy Hash: F871187291C682CEE7A48B18E86476AB7E4FB85794F104039E79A83B95CF3CE444CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: HeapPointerValid
                                                                      • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$_CrtCheckMemory()$_CrtIsValidHeapPointer(pUserData)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$L7$LX
                                                                      • API String ID: 299318057-1988567080
                                                                      • Opcode ID: daa921bd4a8f87b13c34e3fb9a704e2154bbea7e848b38387929040681ee6967
                                                                      • Instruction ID: 2cf83995ab320771e23b47fd9d6c5d41e0f17a034011b692f47f2f4463a946e1
                                                                      • Opcode Fuzzy Hash: daa921bd4a8f87b13c34e3fb9a704e2154bbea7e848b38387929040681ee6967
                                                                      • Instruction Fuzzy Hash: 5E314235A1C74689EBA49B1DEC6123977A5FB947C1F501035EB9E87BA6EF2CE440CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: EncodePointer$_realloc_dbg
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\onexit.c$}
                                                                      • API String ID: 429494535-1858280179
                                                                      • Opcode ID: c2a3dc5e3c5b3ef6ce05fce9891920db6be9e05d2791cfb21aba20a8a533fa4f
                                                                      • Instruction ID: 7b4769518a7b4e50ae39a0034f7065082f7239885cb33ba9a4e1ddf9f6094358
                                                                      • Opcode Fuzzy Hash: c2a3dc5e3c5b3ef6ce05fce9891920db6be9e05d2791cfb21aba20a8a533fa4f
                                                                      • Instruction Fuzzy Hash: 8D41B436A1DB858ADA50CB49F89432AB7A4FB897D4F101035FB8E43B69DF7DD0958B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Pointer$Decode$_initterm$EncodeExitProcess__crt
                                                                      • String ID:
                                                                      • API String ID: 3799933513-0
                                                                      • Opcode ID: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                      • Instruction ID: e3f5727788b862f41489d4621535fad309e9e8611a4054d399f78648deca3d74
                                                                      • Opcode Fuzzy Hash: c9a1689ff4177d35e5a558f0089bed0cb41f7669401f9128f576ef3edf69137f
                                                                      • Instruction Fuzzy Hash: 4A510E3291DA4689E7609B18FC6532977A4FB847C4F102235E7AD82BA6DF7CD494CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 1967237116-734865713
                                                                      • Opcode ID: 3c24d1ab21f2eaa164015dd35ad3ad4baa8f1e206880d9711f96d4d726ca0df5
                                                                      • Instruction ID: d635b70c2ea70c62f18d193870598b6c864dca2804fcaa1e2c20db5079e6afc3
                                                                      • Opcode Fuzzy Hash: 3c24d1ab21f2eaa164015dd35ad3ad4baa8f1e206880d9711f96d4d726ca0df5
                                                                      • Instruction Fuzzy Hash: 80D1CA7690CAC28AE7708B59E8553AAB7E1F784395F100136E79D87A99DF7CE480CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 100%
                                                                      			E00007FF87FF8BE59DF8D(signed short _a1208, signed int _a1412) {
                                                                      
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}



                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ("Incorrect format specifier", 0)$7$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 0-1585035072
                                                                      • Opcode ID: 3ac2e27d66d95a25dfb2edd2f0848946df9d4bfe2e481795af5e1dbd4b0ec7bb
                                                                      • Instruction ID: 38ad379571a1817de6ba2954f0e0a549f2657c99dedbf14922baf2cdbeaa3568
                                                                      • Opcode Fuzzy Hash: 3ac2e27d66d95a25dfb2edd2f0848946df9d4bfe2e481795af5e1dbd4b0ec7bb
                                                                      • Instruction Fuzzy Hash: 30B1DD7650C6C28AE7709B59E8553EBB7A1FB84395F000136EB8987699DF7CE440CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (count == 0) || (string != NULL)$(format != NULL)$_vswprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vswprint.c
                                                                      • API String ID: 2123368286-1876092940
                                                                      • Opcode ID: 5533e41279f98ba4d4f5350db4eab6cd9eaa803fb231b9fee7a87e58e20f6e26
                                                                      • Instruction ID: 6332848b3215f640812f7419392b569fe26b5afe0f1bda9b4973a2d3c60429ef
                                                                      • Opcode Fuzzy Hash: 5533e41279f98ba4d4f5350db4eab6cd9eaa803fb231b9fee7a87e58e20f6e26
                                                                      • Instruction Fuzzy Hash: EF912C3651CB85CAE7A08B19E8547AA77A0FB847D4F109135E79E87BA9DF3CD444CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 84%
                                                                      			E00007FF87FF8BE59DDE0(signed int _a80, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544) {
                                                                      
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}



                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                                      • API String ID: 530996419-4206863317
                                                                      • Opcode ID: 7c5d23002966610aaf37fd2e87aab718b594dfcb558d5e32631a425086473698
                                                                      • Instruction ID: ae6229b1d319608e854d8743a5100dd12f1c8eed4662ba56b24e47ebe5e238cc
                                                                      • Opcode Fuzzy Hash: 7c5d23002966610aaf37fd2e87aab718b594dfcb558d5e32631a425086473698
                                                                      • Instruction Fuzzy Hash: 3C9109B690C6C18AE7B08B19E8913BAB3A1F785795F400136E7CD87A94DF6DD891DF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 84%
                                                                      			E00007FF87FF8BE59BE32(signed int _a80, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096) {
                                                                      
                                                                      				_a972 = _a696 & 0x000000ff;
                                                                      				if (_a972 == 0x49) goto 0xbe59beb7;
                                                                      				if (_a972 == 0x68) goto 0xbe59bfc0;
                                                                      				if (_a972 == 0x6c) goto 0xbe59be76;
                                                                      				if (_a972 == 0x77) goto 0xbe59bfcd;
                                                                      				goto 0xbe59bfd9;
                                                                      				if ( *_a1096 != 0x6c) goto 0xbe59bea7;
                                                                      				_a1096 = _a1096 + 1;
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59beb2;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xf");
                                                                      				if ( *_a1096 != 0x36) goto 0xbe59bf09;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xbe59bf09;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 != 0x33) goto 0xbe59bf4c;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xbe59bf4c;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 == 0x64) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x69) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x6f) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x75) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x78) goto 0xbe59bfac;
                                                                      				if ( *_a1096 != 0x58) goto 0xbe59bfae;
                                                                      				goto 0xbe59bfbe;
                                                                      				_a704 = 0;
                                                                      				goto E00007FF87FF8BE59BB66;
                                                                      				goto 0xbe59bfd9;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}



                                                                      0x7ff8be59be3a
                                                                      0x7ff8be59be49
                                                                      0x7ff8be59be53
                                                                      0x7ff8be59be61
                                                                      0x7ff8be59be6b
                                                                      0x7ff8be59be71
                                                                      0x7ff8be59be84
                                                                      0x7ff8be59be91
                                                                      0x7ff8be59be9d
                                                                      0x7ff8be59bea5
                                                                      0x7ff8be59beae
                                                                      0x7ff8be59beb2
                                                                      0x7ff8be59bebb
                                                                      0x7ff8be59bed1
                                                                      0x7ff8be59bee2
                                                                      0x7ff8be59bef0
                                                                      0x7ff8be59befc
                                                                      0x7ff8be59bf04
                                                                      0x7ff8be59bf17
                                                                      0x7ff8be59bf28
                                                                      0x7ff8be59bf36
                                                                      0x7ff8be59bf42
                                                                      0x7ff8be59bf4a
                                                                      0x7ff8be59bf5a
                                                                      0x7ff8be59bf6a
                                                                      0x7ff8be59bf7a
                                                                      0x7ff8be59bf8a
                                                                      0x7ff8be59bf9a
                                                                      0x7ff8be59bfaa
                                                                      0x7ff8be59bfac
                                                                      0x7ff8be59bfae
                                                                      0x7ff8be59bfb9
                                                                      0x7ff8be59bfbe
                                                                      0x7ff8be59bfc7
                                                                      0x7ff8be59bfcb
                                                                      0x7ff8be59bfd1
                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c$w
                                                                      • API String ID: 530996419-3826063230
                                                                      • Opcode ID: ca0a1c3a4d76a0406b352d4f9ca239403a79a6076d76e868b137271f3bc4e837
                                                                      • Instruction ID: 5e5fc4cc6244857c58405fb4be9867303a3dc60d1a10238196dfd82bc7969210
                                                                      • Opcode Fuzzy Hash: ca0a1c3a4d76a0406b352d4f9ca239403a79a6076d76e868b137271f3bc4e837
                                                                      • Instruction Fuzzy Hash: 0E914F6690C6C18EF7B18B58E8A43BEBBA4E784391F440036D7CD87A99DF6CD5418F08
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 27%
                                                                      			E00007FF87FF8BE59DCA8(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                      				void* _t171;
                                                                      				char* _t191;
                                                                      				char* _t192;
                                                                      
                                                                      				_a1404 = _a1208 & 0x0000ffff;
                                                                      				if (_a1404 == 0x20) goto 0xbe59dd05;
                                                                      				if (_a1404 == 0x23) goto 0xbe59dd12;
                                                                      				if (_a1404 == 0x2b) goto 0xbe59dcf8;
                                                                      				if (_a1404 == 0x2d) goto 0xbe59dceb;
                                                                      				if (_a1404 == 0x30) goto 0xbe59dd20;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000001;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000002;
                                                                      				goto 0xbe59dd2b;
                                                                      				asm("bts eax, 0x7");
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000008;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59dd6c;
                                                                      				_t191 =  &_a1560;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t191);
                                                                      				if (_a88 >= 0) goto 0xbe59dd6a;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59dd83;
                                                                      				_a88 = _t171 + _t191 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59ddc4;
                                                                      				_t192 =  &_a1560;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t192);
                                                                      				if (_a116 >= 0) goto 0xbe59ddc2;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59dddb;
                                                                      				_a116 = _t171 + _t192 - 0x30;
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59dcb0
                                                                      0x7ff8be59dcbf
                                                                      0x7ff8be59dcc9
                                                                      0x7ff8be59dcd3
                                                                      0x7ff8be59dcdd
                                                                      0x7ff8be59dce7
                                                                      0x7ff8be59dce9
                                                                      0x7ff8be59dcf2
                                                                      0x7ff8be59dcf6
                                                                      0x7ff8be59dcff
                                                                      0x7ff8be59dd03
                                                                      0x7ff8be59dd0c
                                                                      0x7ff8be59dd10
                                                                      0x7ff8be59dd16
                                                                      0x7ff8be59dd1e
                                                                      0x7ff8be59dd27
                                                                      0x7ff8be59dd3b
                                                                      0x7ff8be59dd3d
                                                                      0x7ff8be59dd4a
                                                                      0x7ff8be59dd53
                                                                      0x7ff8be59dd5c
                                                                      0x7ff8be59dd66
                                                                      0x7ff8be59dd6a
                                                                      0x7ff8be59dd7f
                                                                      0x7ff8be59dd88
                                                                      0x7ff8be59dda0
                                                                      0x7ff8be59dda2
                                                                      0x7ff8be59ddaf
                                                                      0x7ff8be59ddb8
                                                                      0x7ff8be59ddba
                                                                      0x7ff8be59ddc2
                                                                      0x7ff8be59ddd7
                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$0$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 530996419-1247675978
                                                                      • Opcode ID: f21bac4cf66fd83060826b10cda673f64da0b58cdc9b26c9e440e84a16dbb144
                                                                      • Instruction ID: c273e4bf3a685d4e8cc91b5f1b8cfeca08e37c1b46a5c01b54e7ebc916c79cc9
                                                                      • Opcode Fuzzy Hash: f21bac4cf66fd83060826b10cda673f64da0b58cdc9b26c9e440e84a16dbb144
                                                                      • Instruction Fuzzy Hash: 9B510CB690C6C28EE7708B28E8653FAB7A0FB85395F400135D79A87999DB7CE441DF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 27%
                                                                      			E00007FF87FF8BE59BCFA(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                      				void* _t171;
                                                                      				char* _t191;
                                                                      				char* _t192;
                                                                      
                                                                      				_a968 = _a696 & 0x000000ff;
                                                                      				if (_a968 == 0x20) goto 0xbe59bd57;
                                                                      				if (_a968 == 0x23) goto 0xbe59bd64;
                                                                      				if (_a968 == 0x2b) goto 0xbe59bd4a;
                                                                      				if (_a968 == 0x2d) goto 0xbe59bd3d;
                                                                      				if (_a968 == 0x30) goto 0xbe59bd72;
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000001;
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000002;
                                                                      				goto 0xbe59bd7d;
                                                                      				asm("bts eax, 0x7");
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000008;
                                                                      				if (_a696 != 0x2a) goto 0xbe59bdbe;
                                                                      				_t191 =  &_a1112;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t191);
                                                                      				if (_a88 >= 0) goto 0xbe59bdbc;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59bdd5;
                                                                      				_a88 = _t171 + _t191 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if (_a696 != 0x2a) goto 0xbe59be16;
                                                                      				_t192 =  &_a1112;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t192);
                                                                      				if (_a116 >= 0) goto 0xbe59be14;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59be2d;
                                                                      				_a116 = _t171 + _t192 - 0x30;
                                                                      				_a972 = _a696 & 0x000000ff;
                                                                      				if (_a972 == 0x49) goto 0xbe59beb7;
                                                                      				if (_a972 == 0x68) goto 0xbe59bfc0;
                                                                      				if (_a972 == 0x6c) goto 0xbe59be76;
                                                                      				if (_a972 == 0x77) goto 0xbe59bfcd;
                                                                      				goto 0xbe59bfd9;
                                                                      				if ( *_a1096 != 0x6c) goto 0xbe59bea7;
                                                                      				_a1096 = _a1096 + 1;
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59beb2;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xf");
                                                                      				if ( *_a1096 != 0x36) goto 0xbe59bf09;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xbe59bf09;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 != 0x33) goto 0xbe59bf4c;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xbe59bf4c;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 == 0x64) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x69) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x6f) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x75) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x78) goto 0xbe59bfac;
                                                                      				if ( *_a1096 != 0x58) goto 0xbe59bfae;
                                                                      				goto 0xbe59bfbe;
                                                                      				_a704 = 0;
                                                                      				goto E00007FF87FF8BE59BB66;
                                                                      				goto 0xbe59bfd9;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59bd02
                                                                      0x7ff8be59bd11
                                                                      0x7ff8be59bd1b
                                                                      0x7ff8be59bd25
                                                                      0x7ff8be59bd2f
                                                                      0x7ff8be59bd39
                                                                      0x7ff8be59bd3b
                                                                      0x7ff8be59bd44
                                                                      0x7ff8be59bd48
                                                                      0x7ff8be59bd51
                                                                      0x7ff8be59bd55
                                                                      0x7ff8be59bd5e
                                                                      0x7ff8be59bd62
                                                                      0x7ff8be59bd68
                                                                      0x7ff8be59bd70
                                                                      0x7ff8be59bd79
                                                                      0x7ff8be59bd8d
                                                                      0x7ff8be59bd8f
                                                                      0x7ff8be59bd9c
                                                                      0x7ff8be59bda5
                                                                      0x7ff8be59bdae
                                                                      0x7ff8be59bdb8
                                                                      0x7ff8be59bdbc
                                                                      0x7ff8be59bdd1
                                                                      0x7ff8be59bdda
                                                                      0x7ff8be59bdf2
                                                                      0x7ff8be59bdf4
                                                                      0x7ff8be59be01
                                                                      0x7ff8be59be0a
                                                                      0x7ff8be59be0c
                                                                      0x7ff8be59be14
                                                                      0x7ff8be59be29
                                                                      0x7ff8be59be3a
                                                                      0x7ff8be59be49
                                                                      0x7ff8be59be53
                                                                      0x7ff8be59be61
                                                                      0x7ff8be59be6b
                                                                      0x7ff8be59be71
                                                                      0x7ff8be59be84
                                                                      0x7ff8be59be91
                                                                      0x7ff8be59be9d
                                                                      0x7ff8be59bea5
                                                                      0x7ff8be59beae
                                                                      0x7ff8be59beb2
                                                                      0x7ff8be59bebb
                                                                      0x7ff8be59bed1
                                                                      0x7ff8be59bee2
                                                                      0x7ff8be59bef0
                                                                      0x7ff8be59befc
                                                                      0x7ff8be59bf04
                                                                      0x7ff8be59bf17
                                                                      0x7ff8be59bf28
                                                                      0x7ff8be59bf36
                                                                      0x7ff8be59bf42
                                                                      0x7ff8be59bf4a
                                                                      0x7ff8be59bf5a
                                                                      0x7ff8be59bf6a
                                                                      0x7ff8be59bf7a
                                                                      0x7ff8be59bf8a
                                                                      0x7ff8be59bf9a
                                                                      0x7ff8be59bfaa
                                                                      0x7ff8be59bfac
                                                                      0x7ff8be59bfae
                                                                      0x7ff8be59bfb9
                                                                      0x7ff8be59bfbe
                                                                      0x7ff8be59bfc7
                                                                      0x7ff8be59bfcb
                                                                      0x7ff8be59bfd1
                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$0$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 530996419-4087627031
                                                                      • Opcode ID: 1de43203eafd45e9ce0d0d64285ee361cc766a04d488c37d7d0694f7340f7322
                                                                      • Instruction ID: 441afcbf617b4e262d0052aed56e413d3d0bcfc090eec4776a1ce96be0830d99
                                                                      • Opcode Fuzzy Hash: 1de43203eafd45e9ce0d0d64285ee361cc766a04d488c37d7d0694f7340f7322
                                                                      • Instruction Fuzzy Hash: 24512DB690C6C28EF7B19B58E8A83FEBBA4E784384F441135D3D986999DB6CD540CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 26%
                                                                      			E00007FF87FF8BE59DD30(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                      				void* _t139;
                                                                      				char* _t159;
                                                                      				char* _t160;
                                                                      
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59dd6c;
                                                                      				_t159 =  &_a1560;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t159);
                                                                      				if (_a88 >= 0) goto 0xbe59dd6a;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59dd83;
                                                                      				_a88 = _t139 + _t159 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59ddc4;
                                                                      				_t160 =  &_a1560;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t160);
                                                                      				if (_a116 >= 0) goto 0xbe59ddc2;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59dddb;
                                                                      				_a116 = _t139 + _t160 - 0x30;
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59dd3b
                                                                      0x7ff8be59dd3d
                                                                      0x7ff8be59dd4a
                                                                      0x7ff8be59dd53
                                                                      0x7ff8be59dd5c
                                                                      0x7ff8be59dd66
                                                                      0x7ff8be59dd6a
                                                                      0x7ff8be59dd7f
                                                                      0x7ff8be59dd88
                                                                      0x7ff8be59dda0
                                                                      0x7ff8be59dda2
                                                                      0x7ff8be59ddaf
                                                                      0x7ff8be59ddb8
                                                                      0x7ff8be59ddba
                                                                      0x7ff8be59ddc2
                                                                      0x7ff8be59ddd7
                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2576288505-734865713
                                                                      • Opcode ID: 84afe223306fb715127401468d722999f495e1b64e531eed53167a130bda57e2
                                                                      • Instruction ID: f2f561e5136af35516e5e236c80ba70f371f545726186ed82adb7f04bf626501
                                                                      • Opcode Fuzzy Hash: 84afe223306fb715127401468d722999f495e1b64e531eed53167a130bda57e2
                                                                      • Instruction Fuzzy Hash: C051EAB690C6C28EE7709B18E8643FAB7A4EB84395F400135E78987999DF6CD481CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 26%
                                                                      			E00007FF87FF8BE59BD82(signed int _a80, signed int _a88, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                      				void* _t139;
                                                                      				char* _t159;
                                                                      				char* _t160;
                                                                      
                                                                      				if (_a696 != 0x2a) goto 0xbe59bdbe;
                                                                      				_t159 =  &_a1112;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t159);
                                                                      				if (_a88 >= 0) goto 0xbe59bdbc;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59bdd5;
                                                                      				_a88 = _t139 + _t159 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if (_a696 != 0x2a) goto 0xbe59be16;
                                                                      				_t160 =  &_a1112;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t160);
                                                                      				if (_a116 >= 0) goto 0xbe59be14;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59be2d;
                                                                      				_a116 = _t139 + _t160 - 0x30;
                                                                      				_a972 = _a696 & 0x000000ff;
                                                                      				if (_a972 == 0x49) goto 0xbe59beb7;
                                                                      				if (_a972 == 0x68) goto 0xbe59bfc0;
                                                                      				if (_a972 == 0x6c) goto 0xbe59be76;
                                                                      				if (_a972 == 0x77) goto 0xbe59bfcd;
                                                                      				goto 0xbe59bfd9;
                                                                      				if ( *_a1096 != 0x6c) goto 0xbe59bea7;
                                                                      				_a1096 = _a1096 + 1;
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59beb2;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xf");
                                                                      				if ( *_a1096 != 0x36) goto 0xbe59bf09;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xbe59bf09;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 != 0x33) goto 0xbe59bf4c;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xbe59bf4c;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 == 0x64) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x69) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x6f) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x75) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x78) goto 0xbe59bfac;
                                                                      				if ( *_a1096 != 0x58) goto 0xbe59bfae;
                                                                      				goto 0xbe59bfbe;
                                                                      				_a704 = 0;
                                                                      				goto E00007FF87FF8BE59BB66;
                                                                      				goto 0xbe59bfd9;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59bd8d
                                                                      0x7ff8be59bd8f
                                                                      0x7ff8be59bd9c
                                                                      0x7ff8be59bda5
                                                                      0x7ff8be59bdae
                                                                      0x7ff8be59bdb8
                                                                      0x7ff8be59bdbc
                                                                      0x7ff8be59bdd1
                                                                      0x7ff8be59bdda
                                                                      0x7ff8be59bdf2
                                                                      0x7ff8be59bdf4
                                                                      0x7ff8be59be01
                                                                      0x7ff8be59be0a
                                                                      0x7ff8be59be0c
                                                                      0x7ff8be59be14
                                                                      0x7ff8be59be29
                                                                      0x7ff8be59be3a
                                                                      0x7ff8be59be49
                                                                      0x7ff8be59be53
                                                                      0x7ff8be59be61
                                                                      0x7ff8be59be6b
                                                                      0x7ff8be59be71
                                                                      0x7ff8be59be84
                                                                      0x7ff8be59be91
                                                                      0x7ff8be59be9d
                                                                      0x7ff8be59bea5
                                                                      0x7ff8be59beae
                                                                      0x7ff8be59beb2
                                                                      0x7ff8be59bebb
                                                                      0x7ff8be59bed1
                                                                      0x7ff8be59bee2
                                                                      0x7ff8be59bef0
                                                                      0x7ff8be59befc
                                                                      0x7ff8be59bf04
                                                                      0x7ff8be59bf17
                                                                      0x7ff8be59bf28
                                                                      0x7ff8be59bf36
                                                                      0x7ff8be59bf42
                                                                      0x7ff8be59bf4a
                                                                      0x7ff8be59bf5a
                                                                      0x7ff8be59bf6a
                                                                      0x7ff8be59bf7a
                                                                      0x7ff8be59bf8a
                                                                      0x7ff8be59bf9a
                                                                      0x7ff8be59bfaa
                                                                      0x7ff8be59bfac
                                                                      0x7ff8be59bfae
                                                                      0x7ff8be59bfb9
                                                                      0x7ff8be59bfbe
                                                                      0x7ff8be59bfc7
                                                                      0x7ff8be59bfcb
                                                                      0x7ff8be59bfd1
                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2576288505-192189897
                                                                      • Opcode ID: 642eb86adef82c061240f963ecada7643a5a14508ef6930c6b5b5b901d4a1b0a
                                                                      • Instruction ID: 7d3b3d54585f3f75aefc1c2cb8831269796d95dab78fa2a56dfa5acdc2ce7bbf
                                                                      • Opcode Fuzzy Hash: 642eb86adef82c061240f963ecada7643a5a14508ef6930c6b5b5b901d4a1b0a
                                                                      • Instruction Fuzzy Hash: 85511C7690C6C68EE7B0DB28E8A83FEBBA4E784394F401135D79986999DF2CD541CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 24%
                                                                      			E00007FF87FF8BE59BDE7(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                      				void* _t113;
                                                                      				char* _t133;
                                                                      
                                                                      				if (_a696 != 0x2a) goto 0xbe59be16;
                                                                      				_t133 =  &_a1112;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t133);
                                                                      				if (_a116 >= 0) goto 0xbe59be14;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59be2d;
                                                                      				_a116 = _t113 + _t133 - 0x30;
                                                                      				_a972 = _a696 & 0x000000ff;
                                                                      				if (_a972 == 0x49) goto 0xbe59beb7;
                                                                      				if (_a972 == 0x68) goto 0xbe59bfc0;
                                                                      				if (_a972 == 0x6c) goto 0xbe59be76;
                                                                      				if (_a972 == 0x77) goto 0xbe59bfcd;
                                                                      				goto 0xbe59bfd9;
                                                                      				if ( *_a1096 != 0x6c) goto 0xbe59bea7;
                                                                      				_a1096 = _a1096 + 1;
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59beb2;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xf");
                                                                      				if ( *_a1096 != 0x36) goto 0xbe59bf09;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xbe59bf09;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 != 0x33) goto 0xbe59bf4c;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xbe59bf4c;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 == 0x64) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x69) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x6f) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x75) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x78) goto 0xbe59bfac;
                                                                      				if ( *_a1096 != 0x58) goto 0xbe59bfae;
                                                                      				goto 0xbe59bfbe;
                                                                      				_a704 = 0;
                                                                      				goto E00007FF87FF8BE59BB66;
                                                                      				goto 0xbe59bfd9;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}





                                                                      0x7ff8be59bdf2
                                                                      0x7ff8be59bdf4
                                                                      0x7ff8be59be01
                                                                      0x7ff8be59be0a
                                                                      0x7ff8be59be0c
                                                                      0x7ff8be59be14
                                                                      0x7ff8be59be29
                                                                      0x7ff8be59be3a
                                                                      0x7ff8be59be49
                                                                      0x7ff8be59be53
                                                                      0x7ff8be59be61
                                                                      0x7ff8be59be6b
                                                                      0x7ff8be59be71
                                                                      0x7ff8be59be84
                                                                      0x7ff8be59be91
                                                                      0x7ff8be59be9d
                                                                      0x7ff8be59bea5
                                                                      0x7ff8be59beae
                                                                      0x7ff8be59beb2
                                                                      0x7ff8be59bebb
                                                                      0x7ff8be59bed1
                                                                      0x7ff8be59bee2
                                                                      0x7ff8be59bef0
                                                                      0x7ff8be59befc
                                                                      0x7ff8be59bf04
                                                                      0x7ff8be59bf17
                                                                      0x7ff8be59bf28
                                                                      0x7ff8be59bf36
                                                                      0x7ff8be59bf42
                                                                      0x7ff8be59bf4a
                                                                      0x7ff8be59bf5a
                                                                      0x7ff8be59bf6a
                                                                      0x7ff8be59bf7a
                                                                      0x7ff8be59bf8a
                                                                      0x7ff8be59bf9a
                                                                      0x7ff8be59bfaa
                                                                      0x7ff8be59bfac
                                                                      0x7ff8be59bfae
                                                                      0x7ff8be59bfb9
                                                                      0x7ff8be59bfbe
                                                                      0x7ff8be59bfc7
                                                                      0x7ff8be59bfcb
                                                                      0x7ff8be59bfd1
                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2576288505-192189897
                                                                      • Opcode ID: 9b0d14d024408deea39e0a17da6f412b88ec8238870ee572ebff0cd3a83ccddf
                                                                      • Instruction ID: e8bfced59d9dace20975ca1c512e2a37e2a6ad29840485fa432176d04e216b9e
                                                                      • Opcode Fuzzy Hash: 9b0d14d024408deea39e0a17da6f412b88ec8238870ee572ebff0cd3a83ccddf
                                                                      • Instruction Fuzzy Hash: 2F413E7690C6C28EE7B0DB28E8A83FE7BA4E784784F501135D79986999DF2CD541CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 24%
                                                                      			E00007FF87FF8BE59DD95(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                      				void* _t113;
                                                                      				char* _t133;
                                                                      
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59ddc4;
                                                                      				_t133 =  &_a1560;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t133);
                                                                      				if (_a116 >= 0) goto 0xbe59ddc2;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59dddb;
                                                                      				_a116 = _t113 + _t133 - 0x30;
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}





                                                                      0x7ff8be59dda0
                                                                      0x7ff8be59dda2
                                                                      0x7ff8be59ddaf
                                                                      0x7ff8be59ddb8
                                                                      0x7ff8be59ddba
                                                                      0x7ff8be59ddc2
                                                                      0x7ff8be59ddd7
                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~__invalid_parameterget_int_arg
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2576288505-734865713
                                                                      • Opcode ID: e93e5a5da9d23810187a949f5699427fbde4a421f2c98764f5e18462d0498a04
                                                                      • Instruction ID: 98c49e4e57a653f81bc9defc0c30e588effea10dd31112eb61b3e72aead4c14f
                                                                      • Opcode Fuzzy Hash: e93e5a5da9d23810187a949f5699427fbde4a421f2c98764f5e18462d0498a04
                                                                      • Instruction Fuzzy Hash: 20412DB690C6828EE7708B28E8643FA76A4FB84785F400135D79A879D9DF3CD441CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invoke_watson_if_oneof_swprintf_p
                                                                      • String ID: %.2X $(*_errno())$_printMemBlockData$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                      • API String ID: 2731067127-3604075083
                                                                      • Opcode ID: a5e89465a157929821ec7ea19f55365b45851ed2ed8ce63167a36004212f5177
                                                                      • Instruction ID: d80b9d8beb41786739332bf42b0dbbf69b6605f9c8f916fff2c6071788235f97
                                                                      • Opcode Fuzzy Hash: a5e89465a157929821ec7ea19f55365b45851ed2ed8ce63167a36004212f5177
                                                                      • Instruction Fuzzy Hash: 13413A7260D6818AE7749B59E8607AABBA1FB84780F504136E79D47B8ADF7CD404CF10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 41%
                                                                      			E00007FF87FF8BE594F20(long long __rax, long long __rcx, long long __rdx, long long __r8, long long _a8, long long _a16, long long _a24, signed int _a32) {
                                                                      				void* _v16;
                                                                      				long long _v24;
                                                                      				long long _v32;
                                                                      				long long _v40;
                                                                      				long long _v48;
                                                                      				void* _v56;
                                                                      				signed int _v72;
                                                                      				long long _v80;
                                                                      				signed int _v88;
                                                                      				void* _t88;
                                                                      				void* _t89;
                                                                      				void* _t90;
                                                                      				void* _t92;
                                                                      				void* _t93;
                                                                      				void* _t101;
                                                                      				long long _t113;
                                                                      				intOrPtr _t116;
                                                                      				void* _t117;
                                                                      				long long _t118;
                                                                      				long long _t121;
                                                                      				long long _t122;
                                                                      				long long _t125;
                                                                      				void* _t164;
                                                                      
                                                                      				_t113 = __rax;
                                                                      				_a32 = r9d;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __rcx;
                                                                      				_v88 = E00007FF87FF8BE593B70(_a8, _a16, _a24);
                                                                      				E00007FF87FF8BE58E680(_t79, _t113);
                                                                      				_v80 = _t113;
                                                                      				0xbe584000();
                                                                      				_v56 = _t113 + 0x100;
                                                                      				 *_v56 =  *_v56 + 1;
                                                                      				if (_v88 == 0xffffffff) goto 0xbe595103;
                                                                      				if (_v88 - _a32 <= 0) goto 0xbe595103;
                                                                      				if (_v88 - 0xffffffff <= 0) goto 0xbe594fb9;
                                                                      				_t116 = _a24;
                                                                      				if (_v88 -  *((intOrPtr*)(_t116 + 4)) >= 0) goto 0xbe594fb9;
                                                                      				goto 0xbe594fbe;
                                                                      				E00007FF87FF8BE58E680(E00007FF87FF8BE58CF80(_t116), _t116);
                                                                      				_t117 = _t116 +  *((intOrPtr*)(_a24 + 8));
                                                                      				_v72 =  *((intOrPtr*)(_t117 + _v88 * 8));
                                                                      				_t88 = E00007FF87FF8BE58E680( *((intOrPtr*)(_t117 + _v88 * 8)), _t117);
                                                                      				_t118 = _t117 +  *((intOrPtr*)(_a24 + 8));
                                                                      				if ( *((intOrPtr*)(_t118 + 4 + _v88 * 8)) == 0) goto 0xbe595038;
                                                                      				_t89 = E00007FF87FF8BE58E680(_t88, _t118);
                                                                      				_v48 = _t118;
                                                                      				_t90 = E00007FF87FF8BE58E680(_t89, _t118);
                                                                      				_t121 = _v48 +  *((intOrPtr*)(_t118 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                                      				_v40 = _t121;
                                                                      				goto 0xbe595041;
                                                                      				_v40 = 0;
                                                                      				if (_v40 == 0) goto 0xbe5950f4;
                                                                      				r9d = _v72;
                                                                      				_t92 = E00007FF87FF8BE58E680(E00007FF87FF8BE593BD0(_t90, _a8, _a16, _a24), _t121);
                                                                      				_t122 = _t121 +  *((intOrPtr*)(_a24 + 8));
                                                                      				if ( *((intOrPtr*)(_t122 + 4 + _v88 * 8)) == 0) goto 0xbe5950c9;
                                                                      				_t93 = E00007FF87FF8BE58E680(_t92, _t122);
                                                                      				_v32 = _t122;
                                                                      				E00007FF87FF8BE58E680(_t93, _t122);
                                                                      				_t125 = _v32 +  *((intOrPtr*)(_t122 +  *((intOrPtr*)(_a24 + 8)) + 4 + _v88 * 8));
                                                                      				_v24 = _t125;
                                                                      				goto 0xbe5950d2;
                                                                      				_v24 = 0;
                                                                      				r8d = 0x103;
                                                                      				E00007FF87FF8BE58E6C0(E00007FF87FF8BE59D7E0(_v24, _a8, _t164), _t125, _v80);
                                                                      				goto 0xbe5950f6;
                                                                      				_v88 = _v72;
                                                                      				goto 0xbe594f83;
                                                                      				0xbe584000();
                                                                      				if ( *((intOrPtr*)(_t125 + 0x100)) <= 0) goto 0xbe595131;
                                                                      				0xbe584000();
                                                                      				_v16 = _t125 + 0x100;
                                                                      				 *_v16 =  *_v16 - 1;
                                                                      				if (_v88 == 0xffffffff) goto 0xbe59514a;
                                                                      				if (_v88 - _a32 <= 0) goto 0xbe59514a;
                                                                      				_t101 = E00007FF87FF8BE58CF80(_v16);
                                                                      				r9d = _v88;
                                                                      				return E00007FF87FF8BE593BD0(_t101, _a8, _a16, _a24);
                                                                      			}


























                                                                      0x7ff8be594f20
                                                                      0x7ff8be594f20
                                                                      0x7ff8be594f25
                                                                      0x7ff8be594f2a
                                                                      0x7ff8be594f2f
                                                                      0x7ff8be594f55
                                                                      0x7ff8be594f59
                                                                      0x7ff8be594f5e
                                                                      0x7ff8be594f63
                                                                      0x7ff8be594f6e
                                                                      0x7ff8be594f81
                                                                      0x7ff8be594f88
                                                                      0x7ff8be594f99
                                                                      0x7ff8be594fa4
                                                                      0x7ff8be594fa6
                                                                      0x7ff8be594fb5
                                                                      0x7ff8be594fb7
                                                                      0x7ff8be594fbe
                                                                      0x7ff8be594fcf
                                                                      0x7ff8be594fda
                                                                      0x7ff8be594fde
                                                                      0x7ff8be594fef
                                                                      0x7ff8be594ffc
                                                                      0x7ff8be594ffe
                                                                      0x7ff8be595003
                                                                      0x7ff8be595008
                                                                      0x7ff8be59502e
                                                                      0x7ff8be595031
                                                                      0x7ff8be595036
                                                                      0x7ff8be595038
                                                                      0x7ff8be595047
                                                                      0x7ff8be59504d
                                                                      0x7ff8be59506f
                                                                      0x7ff8be595080
                                                                      0x7ff8be59508d
                                                                      0x7ff8be59508f
                                                                      0x7ff8be595094
                                                                      0x7ff8be595099
                                                                      0x7ff8be5950bf
                                                                      0x7ff8be5950c2
                                                                      0x7ff8be5950c7
                                                                      0x7ff8be5950c9
                                                                      0x7ff8be5950d2
                                                                      0x7ff8be5950ef
                                                                      0x7ff8be5950f4
                                                                      0x7ff8be5950fa
                                                                      0x7ff8be5950fe
                                                                      0x7ff8be595103
                                                                      0x7ff8be59510f
                                                                      0x7ff8be595111
                                                                      0x7ff8be59511c
                                                                      0x7ff8be59512f
                                                                      0x7ff8be595136
                                                                      0x7ff8be595143
                                                                      0x7ff8be595145
                                                                      0x7ff8be59514a
                                                                      0x7ff8be595170

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: State$_inconsistency$BaseControlCurrentFromImage
                                                                      • String ID:
                                                                      • API String ID: 2452617236-0
                                                                      • Opcode ID: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                                      • Instruction ID: c876dcbc44712448dc3d9f7b786ff03c226bed97feb4665016a31bb85c77af6c
                                                                      • Opcode Fuzzy Hash: 03736bbfa20cfa1d6e80738f38b28c8345d2a0856ef117f7f635166efef2818c
                                                                      • Instruction Fuzzy Hash: 7E610D3690DA818ADA70DB19E8A53AAB3A0FBC5789F104531E7DD83B5ADF3CD4508B40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 27%
                                                                      			E00007FF87FF8BE589F20(intOrPtr __ecx, intOrPtr* __rax, intOrPtr _a8) {
                                                                      				long long _v16;
                                                                      				intOrPtr _v20;
                                                                      				intOrPtr _v24;
                                                                      				int _v28;
                                                                      				int _v32;
                                                                      				char _v64;
                                                                      				long long _v72;
                                                                      				intOrPtr _t29;
                                                                      				intOrPtr* _t41;
                                                                      
                                                                      				_t41 = __rax;
                                                                      				_a8 = __ecx;
                                                                      				_v16 = 0xfffffffe;
                                                                      				_v72 = 0;
                                                                      				0xbe5866b0();
                                                                      				 *0xbe5acd68 = 0;
                                                                      				if (_a8 != 0xfffffffe) goto 0xbe589f81;
                                                                      				 *0xbe5acd68 = 1;
                                                                      				_v32 = GetOEMCP();
                                                                      				E00007FF87FF8BE586800( &_v64);
                                                                      				goto 0xbe589fe3;
                                                                      				if (_a8 != 0xfffffffd) goto 0xbe589fae;
                                                                      				 *0xbe5acd68 = 1;
                                                                      				_v28 = GetACP();
                                                                      				E00007FF87FF8BE586800( &_v64);
                                                                      				_t29 = _v28;
                                                                      				goto 0xbe589fe3;
                                                                      				if (_a8 != 0xfffffffc) goto 0xbe589fe3;
                                                                      				 *0xbe5acd68 = 1;
                                                                      				E00007FF87FF8BE586840(_t29,  &_v64);
                                                                      				_v24 =  *((intOrPtr*)( *_t41 + 4));
                                                                      				E00007FF87FF8BE586800( &_v64);
                                                                      				goto 0xbe589ff9;
                                                                      				_v20 = _a8;
                                                                      				E00007FF87FF8BE586800( &_v64);
                                                                      				return _v20;
                                                                      			}












                                                                      0x7ff8be589f20
                                                                      0x7ff8be589f20
                                                                      0x7ff8be589f28
                                                                      0x7ff8be589f31
                                                                      0x7ff8be589f44
                                                                      0x7ff8be589f4a
                                                                      0x7ff8be589f59
                                                                      0x7ff8be589f5b
                                                                      0x7ff8be589f6b
                                                                      0x7ff8be589f74
                                                                      0x7ff8be589f7f
                                                                      0x7ff8be589f86
                                                                      0x7ff8be589f88
                                                                      0x7ff8be589f98
                                                                      0x7ff8be589fa1
                                                                      0x7ff8be589fa6
                                                                      0x7ff8be589fac
                                                                      0x7ff8be589fb3
                                                                      0x7ff8be589fb5
                                                                      0x7ff8be589fc4
                                                                      0x7ff8be589fcf
                                                                      0x7ff8be589fd8
                                                                      0x7ff8be589fe1
                                                                      0x7ff8be589fe7
                                                                      0x7ff8be589ff0
                                                                      0x7ff8be589ffd

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_
                                                                      • String ID:
                                                                      • API String ID: 1901436342-0
                                                                      • Opcode ID: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                                      • Instruction ID: 2d9d525b6b850e88141b1bb045bcce683a04bce63c4fdf468b497f43e76cca70
                                                                      • Opcode Fuzzy Hash: 69024ba52bd34e7b32b0e788ec4f64afe9409c237456bc3d803b93947163d83b
                                                                      • Instruction Fuzzy Hash: 1C21CD7290C6418EE7349B18E86526ABBB0FB847A4F500335E3AD466E6CF7CD945CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: P$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$sizeInBytes > retsize
                                                                      • API String ID: 2123368286-552404435
                                                                      • Opcode ID: 2c731414488d35c21f2780f328146d5dcf70469cadf2ee42e60feab36cc6bb66
                                                                      • Instruction ID: 93e8ee082a7ec4c071ef3afe4ab08df3b7ca8ec9967c72cc6c93722373e2eafd
                                                                      • Opcode Fuzzy Hash: 2c731414488d35c21f2780f328146d5dcf70469cadf2ee42e60feab36cc6bb66
                                                                      • Instruction Fuzzy Hash: 5451C92690CBC58AEA709B58E8643EAB3A0FB857A4F104335D7AD43BD9DF3DD4458B01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 28%
                                                                      			E00007FF87FF8BE59DC6B(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                      				void* _t184;
                                                                      				char* _t204;
                                                                      				char* _t205;
                                                                      
                                                                      				_a112 = 0;
                                                                      				_a108 = _a112;
                                                                      				_a88 = _a108;
                                                                      				_a92 = _a88;
                                                                      				_a80 = 0;
                                                                      				_a116 = 0xffffffff;
                                                                      				_a76 = 0;
                                                                      				_a1404 = _a1208 & 0x0000ffff;
                                                                      				if (_a1404 == 0x20) goto 0xbe59dd05;
                                                                      				if (_a1404 == 0x23) goto 0xbe59dd12;
                                                                      				if (_a1404 == 0x2b) goto 0xbe59dcf8;
                                                                      				if (_a1404 == 0x2d) goto 0xbe59dceb;
                                                                      				if (_a1404 == 0x30) goto 0xbe59dd20;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000001;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000002;
                                                                      				goto 0xbe59dd2b;
                                                                      				asm("bts eax, 0x7");
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000008;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59dd6c;
                                                                      				_t204 =  &_a1560;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t204);
                                                                      				if (_a88 >= 0) goto 0xbe59dd6a;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59dd83;
                                                                      				_a88 = _t184 + _t204 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59ddc4;
                                                                      				_t205 =  &_a1560;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t205);
                                                                      				if (_a116 >= 0) goto 0xbe59ddc2;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59dddb;
                                                                      				_a116 = _t184 + _t205 - 0x30;
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59dc6b
                                                                      0x7ff8be59dc77
                                                                      0x7ff8be59dc7f
                                                                      0x7ff8be59dc87
                                                                      0x7ff8be59dc8b
                                                                      0x7ff8be59dc93
                                                                      0x7ff8be59dc9b
                                                                      0x7ff8be59dcb0
                                                                      0x7ff8be59dcbf
                                                                      0x7ff8be59dcc9
                                                                      0x7ff8be59dcd3
                                                                      0x7ff8be59dcdd
                                                                      0x7ff8be59dce7
                                                                      0x7ff8be59dce9
                                                                      0x7ff8be59dcf2
                                                                      0x7ff8be59dcf6
                                                                      0x7ff8be59dcff
                                                                      0x7ff8be59dd03
                                                                      0x7ff8be59dd0c
                                                                      0x7ff8be59dd10
                                                                      0x7ff8be59dd16
                                                                      0x7ff8be59dd1e
                                                                      0x7ff8be59dd27
                                                                      0x7ff8be59dd3b
                                                                      0x7ff8be59dd3d
                                                                      0x7ff8be59dd4a
                                                                      0x7ff8be59dd53
                                                                      0x7ff8be59dd5c
                                                                      0x7ff8be59dd66
                                                                      0x7ff8be59dd6a
                                                                      0x7ff8be59dd7f
                                                                      0x7ff8be59dd88
                                                                      0x7ff8be59dda0
                                                                      0x7ff8be59dda2
                                                                      0x7ff8be59ddaf
                                                                      0x7ff8be59ddb8
                                                                      0x7ff8be59ddba
                                                                      0x7ff8be59ddc2
                                                                      0x7ff8be59ddd7
                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-734865713
                                                                      • Opcode ID: f70cefb569721d9d21904d9e7ba8b3a65f1b1d02a652e36c9b8a6a51e541d649
                                                                      • Instruction ID: 942b61f138cfb53e00cd07dc27f684557f1718e59e95b8b80c52ef2f0c429df6
                                                                      • Opcode Fuzzy Hash: f70cefb569721d9d21904d9e7ba8b3a65f1b1d02a652e36c9b8a6a51e541d649
                                                                      • Instruction Fuzzy Hash: 9C41EBB690C6C18EE7708B28E8643AAB7A0FB84395F500135E79987A99DF7CD441CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 28%
                                                                      			E00007FF87FF8BE59BCBD(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a968, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                      				void* _t184;
                                                                      				char* _t204;
                                                                      				char* _t205;
                                                                      
                                                                      				_a112 = 0;
                                                                      				_a108 = _a112;
                                                                      				_a88 = _a108;
                                                                      				_a92 = _a88;
                                                                      				_a80 = 0;
                                                                      				_a116 = 0xffffffff;
                                                                      				_a76 = 0;
                                                                      				_a968 = _a696 & 0x000000ff;
                                                                      				if (_a968 == 0x20) goto 0xbe59bd57;
                                                                      				if (_a968 == 0x23) goto 0xbe59bd64;
                                                                      				if (_a968 == 0x2b) goto 0xbe59bd4a;
                                                                      				if (_a968 == 0x2d) goto 0xbe59bd3d;
                                                                      				if (_a968 == 0x30) goto 0xbe59bd72;
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000001;
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000002;
                                                                      				goto 0xbe59bd7d;
                                                                      				asm("bts eax, 0x7");
                                                                      				goto 0xbe59bd7d;
                                                                      				_a80 = _a80 | 0x00000008;
                                                                      				if (_a696 != 0x2a) goto 0xbe59bdbe;
                                                                      				_t204 =  &_a1112;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t204);
                                                                      				if (_a88 >= 0) goto 0xbe59bdbc;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59bdd5;
                                                                      				_a88 = _t184 + _t204 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if (_a696 != 0x2a) goto 0xbe59be16;
                                                                      				_t205 =  &_a1112;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t205);
                                                                      				if (_a116 >= 0) goto 0xbe59be14;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59be2d;
                                                                      				_a116 = _t184 + _t205 - 0x30;
                                                                      				_a972 = _a696 & 0x000000ff;
                                                                      				if (_a972 == 0x49) goto 0xbe59beb7;
                                                                      				if (_a972 == 0x68) goto 0xbe59bfc0;
                                                                      				if (_a972 == 0x6c) goto 0xbe59be76;
                                                                      				if (_a972 == 0x77) goto 0xbe59bfcd;
                                                                      				goto 0xbe59bfd9;
                                                                      				if ( *_a1096 != 0x6c) goto 0xbe59bea7;
                                                                      				_a1096 = _a1096 + 1;
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59beb2;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xf");
                                                                      				if ( *_a1096 != 0x36) goto 0xbe59bf09;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xbe59bf09;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 != 0x33) goto 0xbe59bf4c;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xbe59bf4c;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 == 0x64) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x69) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x6f) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x75) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x78) goto 0xbe59bfac;
                                                                      				if ( *_a1096 != 0x58) goto 0xbe59bfae;
                                                                      				goto 0xbe59bfbe;
                                                                      				_a704 = 0;
                                                                      				goto E00007FF87FF8BE59BB66;
                                                                      				goto 0xbe59bfd9;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59bcbd
                                                                      0x7ff8be59bcc9
                                                                      0x7ff8be59bcd1
                                                                      0x7ff8be59bcd9
                                                                      0x7ff8be59bcdd
                                                                      0x7ff8be59bce5
                                                                      0x7ff8be59bced
                                                                      0x7ff8be59bd02
                                                                      0x7ff8be59bd11
                                                                      0x7ff8be59bd1b
                                                                      0x7ff8be59bd25
                                                                      0x7ff8be59bd2f
                                                                      0x7ff8be59bd39
                                                                      0x7ff8be59bd3b
                                                                      0x7ff8be59bd44
                                                                      0x7ff8be59bd48
                                                                      0x7ff8be59bd51
                                                                      0x7ff8be59bd55
                                                                      0x7ff8be59bd5e
                                                                      0x7ff8be59bd62
                                                                      0x7ff8be59bd68
                                                                      0x7ff8be59bd70
                                                                      0x7ff8be59bd79
                                                                      0x7ff8be59bd8d
                                                                      0x7ff8be59bd8f
                                                                      0x7ff8be59bd9c
                                                                      0x7ff8be59bda5
                                                                      0x7ff8be59bdae
                                                                      0x7ff8be59bdb8
                                                                      0x7ff8be59bdbc
                                                                      0x7ff8be59bdd1
                                                                      0x7ff8be59bdda
                                                                      0x7ff8be59bdf2
                                                                      0x7ff8be59bdf4
                                                                      0x7ff8be59be01
                                                                      0x7ff8be59be0a
                                                                      0x7ff8be59be0c
                                                                      0x7ff8be59be14
                                                                      0x7ff8be59be29
                                                                      0x7ff8be59be3a
                                                                      0x7ff8be59be49
                                                                      0x7ff8be59be53
                                                                      0x7ff8be59be61
                                                                      0x7ff8be59be6b
                                                                      0x7ff8be59be71
                                                                      0x7ff8be59be84
                                                                      0x7ff8be59be91
                                                                      0x7ff8be59be9d
                                                                      0x7ff8be59bea5
                                                                      0x7ff8be59beae
                                                                      0x7ff8be59beb2
                                                                      0x7ff8be59bebb
                                                                      0x7ff8be59bed1
                                                                      0x7ff8be59bee2
                                                                      0x7ff8be59bef0
                                                                      0x7ff8be59befc
                                                                      0x7ff8be59bf04
                                                                      0x7ff8be59bf17
                                                                      0x7ff8be59bf28
                                                                      0x7ff8be59bf36
                                                                      0x7ff8be59bf42
                                                                      0x7ff8be59bf4a
                                                                      0x7ff8be59bf5a
                                                                      0x7ff8be59bf6a
                                                                      0x7ff8be59bf7a
                                                                      0x7ff8be59bf8a
                                                                      0x7ff8be59bf9a
                                                                      0x7ff8be59bfaa
                                                                      0x7ff8be59bfac
                                                                      0x7ff8be59bfae
                                                                      0x7ff8be59bfb9
                                                                      0x7ff8be59bfbe
                                                                      0x7ff8be59bfc7
                                                                      0x7ff8be59bfcb
                                                                      0x7ff8be59bfd1
                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-192189897
                                                                      • Opcode ID: 6e7b2e4602a67de0d8444751781932987c77aea524c4ee0e513499fa92d069a1
                                                                      • Instruction ID: 46d19b394571b0fe3c79b0e86ebf6ceec9400694114eb8dc1c77ca767446431f
                                                                      • Opcode Fuzzy Hash: 6e7b2e4602a67de0d8444751781932987c77aea524c4ee0e513499fa92d069a1
                                                                      • Instruction Fuzzy Hash: D4410C7690C6C28EE7B0DB28E8683AEBBA4E784394F401135D79986A99DB3CD541CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 28%
                                                                      			E00007FF87FF8BE59DC41(intOrPtr _a76, signed int _a80, signed int _a88, signed int _a92, signed int _a108, signed int _a112, intOrPtr _a116, char _a1200, signed int _a1208, intOrPtr _a1216, signed int _a1404, signed int _a1408, signed int _a1412, intOrPtr _a1536, signed short* _a1544, char _a1560) {
                                                                      				void* _t190;
                                                                      				char* _t210;
                                                                      				char* _t211;
                                                                      
                                                                      				_a76 = 1;
                                                                      				E00007FF87FF8BE59EE40(_a1208 & 0x0000ffff, _a1536,  &_a1200);
                                                                      				_a112 = 0;
                                                                      				_a108 = _a112;
                                                                      				_a88 = _a108;
                                                                      				_a92 = _a88;
                                                                      				_a80 = 0;
                                                                      				_a116 = 0xffffffff;
                                                                      				_a76 = 0;
                                                                      				_a1404 = _a1208 & 0x0000ffff;
                                                                      				if (_a1404 == 0x20) goto 0xbe59dd05;
                                                                      				if (_a1404 == 0x23) goto 0xbe59dd12;
                                                                      				if (_a1404 == 0x2b) goto 0xbe59dcf8;
                                                                      				if (_a1404 == 0x2d) goto 0xbe59dceb;
                                                                      				if (_a1404 == 0x30) goto 0xbe59dd20;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000001;
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000002;
                                                                      				goto 0xbe59dd2b;
                                                                      				asm("bts eax, 0x7");
                                                                      				goto 0xbe59dd2b;
                                                                      				_a80 = _a80 | 0x00000008;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59dd6c;
                                                                      				_t210 =  &_a1560;
                                                                      				_a88 = E00007FF87FF8BE591E40(_t210);
                                                                      				if (_a88 >= 0) goto 0xbe59dd6a;
                                                                      				_a80 = _a80 | 0x00000004;
                                                                      				_a88 =  ~_a88;
                                                                      				goto 0xbe59dd83;
                                                                      				_a88 = _t190 + _t210 - 0x30;
                                                                      				_a116 = 0;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59ddc4;
                                                                      				_t211 =  &_a1560;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t211);
                                                                      				if (_a116 >= 0) goto 0xbe59ddc2;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59dddb;
                                                                      				_a116 = _t190 + _t211 - 0x30;
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}






                                                                      0x7ff8be59dc41
                                                                      0x7ff8be59dc61
                                                                      0x7ff8be59dc6b
                                                                      0x7ff8be59dc77
                                                                      0x7ff8be59dc7f
                                                                      0x7ff8be59dc87
                                                                      0x7ff8be59dc8b
                                                                      0x7ff8be59dc93
                                                                      0x7ff8be59dc9b
                                                                      0x7ff8be59dcb0
                                                                      0x7ff8be59dcbf
                                                                      0x7ff8be59dcc9
                                                                      0x7ff8be59dcd3
                                                                      0x7ff8be59dcdd
                                                                      0x7ff8be59dce7
                                                                      0x7ff8be59dce9
                                                                      0x7ff8be59dcf2
                                                                      0x7ff8be59dcf6
                                                                      0x7ff8be59dcff
                                                                      0x7ff8be59dd03
                                                                      0x7ff8be59dd0c
                                                                      0x7ff8be59dd10
                                                                      0x7ff8be59dd16
                                                                      0x7ff8be59dd1e
                                                                      0x7ff8be59dd27
                                                                      0x7ff8be59dd3b
                                                                      0x7ff8be59dd3d
                                                                      0x7ff8be59dd4a
                                                                      0x7ff8be59dd53
                                                                      0x7ff8be59dd5c
                                                                      0x7ff8be59dd66
                                                                      0x7ff8be59dd6a
                                                                      0x7ff8be59dd7f
                                                                      0x7ff8be59dd88
                                                                      0x7ff8be59dda0
                                                                      0x7ff8be59dda2
                                                                      0x7ff8be59ddaf
                                                                      0x7ff8be59ddb8
                                                                      0x7ff8be59ddba
                                                                      0x7ff8be59ddc2
                                                                      0x7ff8be59ddd7
                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-734865713
                                                                      • Opcode ID: 7ccb00da1bd0fb9220a44591d36c0492ce99534c897a7d6a17d24537f8dc2fa2
                                                                      • Instruction ID: 9efa3e9519a3b46f2046047ffdb38c083d5e232091102caf106448e0ec883471
                                                                      • Opcode Fuzzy Hash: 7ccb00da1bd0fb9220a44591d36c0492ce99534c897a7d6a17d24537f8dc2fa2
                                                                      • Instruction Fuzzy Hash: FF411BB690C6C28DE7B08B28E8643FAB6A5FB84385F400136D78A87699DF3CD451CF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 24%
                                                                      			E00007FF87FF8BE59BDDA(signed int _a80, intOrPtr _a116, signed int _a696, intOrPtr _a704, char _a972, signed int _a976, void* _a1096, char _a1112) {
                                                                      				void* _t114;
                                                                      				char* _t134;
                                                                      
                                                                      				_a116 = 0;
                                                                      				if (_a696 != 0x2a) goto 0xbe59be16;
                                                                      				_t134 =  &_a1112;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t134);
                                                                      				if (_a116 >= 0) goto 0xbe59be14;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59be2d;
                                                                      				_a116 = _t114 + _t134 - 0x30;
                                                                      				_a972 = _a696 & 0x000000ff;
                                                                      				if (_a972 == 0x49) goto 0xbe59beb7;
                                                                      				if (_a972 == 0x68) goto 0xbe59bfc0;
                                                                      				if (_a972 == 0x6c) goto 0xbe59be76;
                                                                      				if (_a972 == 0x77) goto 0xbe59bfcd;
                                                                      				goto 0xbe59bfd9;
                                                                      				if ( *_a1096 != 0x6c) goto 0xbe59bea7;
                                                                      				_a1096 = _a1096 + 1;
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59beb2;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xf");
                                                                      				if ( *_a1096 != 0x36) goto 0xbe59bf09;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x34) goto 0xbe59bf09;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 != 0x33) goto 0xbe59bf4c;
                                                                      				if ( *((char*)(_a1096 + 1)) != 0x32) goto 0xbe59bf4c;
                                                                      				_a1096 = _a1096 + 2;
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59bfbe;
                                                                      				if ( *_a1096 == 0x64) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x69) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x6f) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x75) goto 0xbe59bfac;
                                                                      				if ( *_a1096 == 0x78) goto 0xbe59bfac;
                                                                      				if ( *_a1096 != 0x58) goto 0xbe59bfae;
                                                                      				goto 0xbe59bfbe;
                                                                      				_a704 = 0;
                                                                      				goto E00007FF87FF8BE59BB66;
                                                                      				goto 0xbe59bfd9;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59bfd9;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a976 = _a696;
                                                                      				_a976 = _a976 - 0x41;
                                                                      				if (_a976 - 0x37 > 0) goto 0xbe59ca31;
                                                                      				goto __rax;
                                                                      			}





                                                                      0x7ff8be59bdda
                                                                      0x7ff8be59bdf2
                                                                      0x7ff8be59bdf4
                                                                      0x7ff8be59be01
                                                                      0x7ff8be59be0a
                                                                      0x7ff8be59be0c
                                                                      0x7ff8be59be14
                                                                      0x7ff8be59be29
                                                                      0x7ff8be59be3a
                                                                      0x7ff8be59be49
                                                                      0x7ff8be59be53
                                                                      0x7ff8be59be61
                                                                      0x7ff8be59be6b
                                                                      0x7ff8be59be71
                                                                      0x7ff8be59be84
                                                                      0x7ff8be59be91
                                                                      0x7ff8be59be9d
                                                                      0x7ff8be59bea5
                                                                      0x7ff8be59beae
                                                                      0x7ff8be59beb2
                                                                      0x7ff8be59bebb
                                                                      0x7ff8be59bed1
                                                                      0x7ff8be59bee2
                                                                      0x7ff8be59bef0
                                                                      0x7ff8be59befc
                                                                      0x7ff8be59bf04
                                                                      0x7ff8be59bf17
                                                                      0x7ff8be59bf28
                                                                      0x7ff8be59bf36
                                                                      0x7ff8be59bf42
                                                                      0x7ff8be59bf4a
                                                                      0x7ff8be59bf5a
                                                                      0x7ff8be59bf6a
                                                                      0x7ff8be59bf7a
                                                                      0x7ff8be59bf8a
                                                                      0x7ff8be59bf9a
                                                                      0x7ff8be59bfaa
                                                                      0x7ff8be59bfac
                                                                      0x7ff8be59bfae
                                                                      0x7ff8be59bfb9
                                                                      0x7ff8be59bfbe
                                                                      0x7ff8be59bfc7
                                                                      0x7ff8be59bfcb
                                                                      0x7ff8be59bfd1
                                                                      0x7ff8be59bfe6
                                                                      0x7ff8be59bff7
                                                                      0x7ff8be59c006
                                                                      0x7ff8be59c02d

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_output_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-192189897
                                                                      • Opcode ID: 365a2dca31272ad0c00aec3a5831cb280a19fde5761ae3667445a1def64af164
                                                                      • Instruction ID: 81a42328d14a3b222b90ec8c47fa52a7b8335207a2a8a52ab530308c273499af
                                                                      • Opcode Fuzzy Hash: 365a2dca31272ad0c00aec3a5831cb280a19fde5761ae3667445a1def64af164
                                                                      • Instruction Fuzzy Hash: E7411C6690C6C28EE7B09B28E8683FE7BA4EB84384F441136D79D86599DF2CD541CF04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 24%
                                                                      			E00007FF87FF8BE59DD88(signed int _a80, intOrPtr _a116, signed int _a1208, intOrPtr _a1216, signed int _a1408, signed int _a1412, signed short* _a1544, char _a1560) {
                                                                      				void* _t114;
                                                                      				char* _t134;
                                                                      
                                                                      				_a116 = 0;
                                                                      				if ((_a1208 & 0x0000ffff) != 0x2a) goto 0xbe59ddc4;
                                                                      				_t134 =  &_a1560;
                                                                      				_a116 = E00007FF87FF8BE591E40(_t134);
                                                                      				if (_a116 >= 0) goto 0xbe59ddc2;
                                                                      				_a116 = 0xffffffff;
                                                                      				goto 0xbe59dddb;
                                                                      				_a116 = _t114 + _t134 - 0x30;
                                                                      				_a1408 = _a1208 & 0x0000ffff;
                                                                      				if (_a1408 == 0x49) goto 0xbe59de66;
                                                                      				if (_a1408 == 0x68) goto 0xbe59df6f;
                                                                      				if (_a1408 == 0x6c) goto 0xbe59de24;
                                                                      				if (_a1408 == 0x77) goto 0xbe59df7c;
                                                                      				goto 0xbe59df88;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x6c) goto 0xbe59de56;
                                                                      				_a1544 =  &(_a1544[1]);
                                                                      				asm("bts eax, 0xc");
                                                                      				goto 0xbe59de61;
                                                                      				_a80 = _a80 | 0x00000010;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xf");
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x36) goto 0xbe59deb8;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x34) goto 0xbe59deb8;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("bts eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x33) goto 0xbe59defb;
                                                                      				if ((_a1544[1] & 0x0000ffff) != 0x32) goto 0xbe59defb;
                                                                      				_a1544 =  &(_a1544[2]);
                                                                      				asm("btr eax, 0xf");
                                                                      				goto 0xbe59df6d;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x64) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x69) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x6f) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x75) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) == 0x78) goto 0xbe59df5b;
                                                                      				if (( *_a1544 & 0x0000ffff) != 0x58) goto 0xbe59df5d;
                                                                      				goto 0xbe59df6d;
                                                                      				_a1216 = 0;
                                                                      				goto E00007FF87FF8BE59DC41;
                                                                      				goto 0xbe59df88;
                                                                      				_a80 = _a80 | 0x00000020;
                                                                      				goto 0xbe59df88;
                                                                      				asm("bts eax, 0xb");
                                                                      				_a1412 = _a1208 & 0x0000ffff;
                                                                      				_a1412 = _a1412 - 0x41;
                                                                      				if (_a1412 - 0x37 > 0) goto 0xbe59ea2a;
                                                                      				goto __rax;
                                                                      			}





                                                                      0x7ff8be59dd88
                                                                      0x7ff8be59dda0
                                                                      0x7ff8be59dda2
                                                                      0x7ff8be59ddaf
                                                                      0x7ff8be59ddb8
                                                                      0x7ff8be59ddba
                                                                      0x7ff8be59ddc2
                                                                      0x7ff8be59ddd7
                                                                      0x7ff8be59dde8
                                                                      0x7ff8be59ddf7
                                                                      0x7ff8be59de01
                                                                      0x7ff8be59de0f
                                                                      0x7ff8be59de19
                                                                      0x7ff8be59de1f
                                                                      0x7ff8be59de32
                                                                      0x7ff8be59de40
                                                                      0x7ff8be59de4c
                                                                      0x7ff8be59de54
                                                                      0x7ff8be59de5d
                                                                      0x7ff8be59de61
                                                                      0x7ff8be59de6a
                                                                      0x7ff8be59de80
                                                                      0x7ff8be59de91
                                                                      0x7ff8be59de9f
                                                                      0x7ff8be59deab
                                                                      0x7ff8be59deb3
                                                                      0x7ff8be59dec6
                                                                      0x7ff8be59ded7
                                                                      0x7ff8be59dee5
                                                                      0x7ff8be59def1
                                                                      0x7ff8be59def9
                                                                      0x7ff8be59df09
                                                                      0x7ff8be59df19
                                                                      0x7ff8be59df29
                                                                      0x7ff8be59df39
                                                                      0x7ff8be59df49
                                                                      0x7ff8be59df59
                                                                      0x7ff8be59df5b
                                                                      0x7ff8be59df5d
                                                                      0x7ff8be59df68
                                                                      0x7ff8be59df6d
                                                                      0x7ff8be59df76
                                                                      0x7ff8be59df7a
                                                                      0x7ff8be59df80
                                                                      0x7ff8be59df95
                                                                      0x7ff8be59dfa6
                                                                      0x7ff8be59dfb5
                                                                      0x7ff8be59dfdc

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_$_invalid_parameter
                                                                      • String ID: ("Incorrect format specifier", 0)$_woutput_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\output.c
                                                                      • API String ID: 2192614184-734865713
                                                                      • Opcode ID: 18be2ec324f4e6ddaf4da83870b7f9445444224664337f66457babe689a72d53
                                                                      • Instruction ID: 172f1819cc8415b5459a06fcb036f630fe1d575414abaa71eb1ad0569af8d917
                                                                      • Opcode Fuzzy Hash: 18be2ec324f4e6ddaf4da83870b7f9445444224664337f66457babe689a72d53
                                                                      • Instruction Fuzzy Hash: B241FAB690C6C28EE7B08B28E8643FA76A5FB84389F400136D79987695DF3CE451DF14
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c, xrefs: 00007FF8BE599578
                                                                      • ("Invalid file descriptor. File possibly closed by a different thread",0), xrefs: 00007FF8BE599563
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer__doserrno_dosmaperr
                                                                      • String ID: ("Invalid file descriptor. File possibly closed by a different thread",0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\lseeki64.c
                                                                      • API String ID: 275287319-2412454244
                                                                      • Opcode ID: c7efb4c2b63aa0ea1a393bbb45a77ac8f6d4c0e98eaf8d85a5d097220697af2b
                                                                      • Instruction ID: 327c0c219484de58cadbfc0e5c7150d0c8e85a3e174b52f6fd2434c30081a3dc
                                                                      • Opcode Fuzzy Hash: c7efb4c2b63aa0ea1a393bbb45a77ac8f6d4c0e98eaf8d85a5d097220697af2b
                                                                      • Instruction Fuzzy Hash: 0431817661CB858AD6609B18E8A116AB365FB857E0F505335E7BE47AE9CF3CE440CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_unlock
                                                                      • String ID: (fNewBits==_CRTDBG_REPORT_FLAG) || ((fNewBits & 0x0ffff & ~(_CRTDBG_ALLOC_MEM_DF | _CRTDBG_DELAY_FREE_MEM_DF | _CRTDBG_CHECK_ALWAY$_CrtSetDbgFlag$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c
                                                                      • API String ID: 2816345473-1282596470
                                                                      • Opcode ID: 3f7f838120eed42c27c7ea3ce685aad0c3061be731b7dc7317e8a9b82dec8473
                                                                      • Instruction ID: dc6a98509b4341bc3bf158d7bfb626b3a8eff04af67f2f4989dc06f7c6ee184a
                                                                      • Opcode Fuzzy Hash: 3f7f838120eed42c27c7ea3ce685aad0c3061be731b7dc7317e8a9b82dec8473
                                                                      • Instruction Fuzzy Hash: 4E312B7191C2428EE360DB2CEC6576A77A0FB40394F002274E7AE876E6DFBCE4448B40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Exception$Rethrow$DestroyedFindFrameObjectRaiseUnlink
                                                                      • String ID: csm
                                                                      • API String ID: 933340387-1018135373
                                                                      • Opcode ID: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                                      • Instruction ID: bb6e9f81e6816eb10fdb03e996faf09eba93d2d40b364d26219039afb5246f2f
                                                                      • Opcode Fuzzy Hash: 185150422f69e9325bbbdd07ff6b0460cc0f5d94f5833ed3dae1d6afaaf19a73
                                                                      • Instruction Fuzzy Hash: 29212C3690C6418ADA609F29E8A43BE67A0FBC0BD1F901132EB9E077A5DF3DD451CB11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _free_nolock$_unlock
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\prebuild\eh\typname.cpp$pNode->_Next != NULL
                                                                      • API String ID: 2500497606-1087415141
                                                                      • Opcode ID: 73e945bef0fa2e243f2cc79ce7faf04cefa07676de83a818dd77e5436e879e5d
                                                                      • Instruction ID: a48f4bf146be66e072f27d9b6b88f957e50cad20a2ec8da82dec5e474baaf177
                                                                      • Opcode Fuzzy Hash: 73e945bef0fa2e243f2cc79ce7faf04cefa07676de83a818dd77e5436e879e5d
                                                                      • Instruction Fuzzy Hash: BB213D26A2DB8585E7A09B09E8A4369B3A0F784BC4F406435EB8F437A5CF7CD440C710
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __doserrno_invalid_parameter
                                                                      • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                      • API String ID: 4140903211-23161695
                                                                      • Opcode ID: 32410c4887627c76782b03988199a8b6bafae630e8670220b1a4c16fdf178152
                                                                      • Instruction ID: 1d93de32f21ff9df133772a99ecee2d223aa4bcecc32792bc640f254fa9a9325
                                                                      • Opcode Fuzzy Hash: 32410c4887627c76782b03988199a8b6bafae630e8670220b1a4c16fdf178152
                                                                      • Instruction Fuzzy Hash: 22113976D1C6028EF7609B68EC683AA73A1FB80384F406139E39D426D5DF7CE5448B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __doserrno_invalid_parameter
                                                                      • String ID: (buf != NULL)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                      • API String ID: 4140903211-3042049227
                                                                      • Opcode ID: b156558e5a530bd8cc364ecba4e09f8d8b9f154ab820f1b2babcd7abee70c9c3
                                                                      • Instruction ID: 8f7a506e6f39e70dc2d42784fa45b8619bbe0b74de91315331b199a0dc954969
                                                                      • Opcode Fuzzy Hash: b156558e5a530bd8cc364ecba4e09f8d8b9f154ab820f1b2babcd7abee70c9c3
                                                                      • Instruction Fuzzy Hash: 06117935A0C6829EF7309B28EC253EA7354FB84398F801136D39C426D6CF7CE1808B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __doserrno_invalid_parameter
                                                                      • String ID: (_osfile(fh) & FOPEN)$_write$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                      • API String ID: 4140903211-1338331675
                                                                      • Opcode ID: 11864ca282438847dd27f4dc85d1758fde49d78cd6d39020a8393d86cd701a27
                                                                      • Instruction ID: 66d0048ca98e05cd8d0b4edfff17d9d33412267ade950dc9713f4b3117e8ee31
                                                                      • Opcode Fuzzy Hash: 11864ca282438847dd27f4dc85d1758fde49d78cd6d39020a8393d86cd701a27
                                                                      • Instruction Fuzzy Hash: 4E014875A0CA428EFB609B28EC643A937A4FB403D4F501239E35D436E6DF7DE5448B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: DecodePointer__doserrno_invalid_parameter
                                                                      • String ID: ((cnt & 1) == 0)$_write_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\write.c
                                                                      • API String ID: 1098298932-1795423647
                                                                      • Opcode ID: 17be20b0b4ddc98d10ae5d9642fe0f8cd8b1b2069c373d6ecdcef621e5a80c70
                                                                      • Instruction ID: f0605e9f057c0999861c23c14e406e6d364b89c145aab25e2f237869cccf8d7a
                                                                      • Opcode Fuzzy Hash: 17be20b0b4ddc98d10ae5d9642fe0f8cd8b1b2069c373d6ecdcef621e5a80c70
                                                                      • Instruction Fuzzy Hash: 87E0ED75D0C94699F6609F18EC363E92250BF847D9F805232D36D4B2E3DF7CA5058740
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 20%
                                                                      			E00007FF87FF8BE59FF00(intOrPtr __ecx, intOrPtr _a8) {
                                                                      				signed int _v16;
                                                                      				signed int _v20;
                                                                      				signed int _v24;
                                                                      
                                                                      				_a8 = __ecx;
                                                                      				_v24 = 0;
                                                                      				_v16 = 0;
                                                                      				0xbe589300();
                                                                      				_v20 = 0;
                                                                      				_v20 = _v20 + 1;
                                                                      				if (_v20 -  *0xbe5ae520 >= 0) goto 0xbe5a0042;
                                                                      				if ( *((long long*)( *0xbe5ad500 + _v20 * 8)) == 0) goto 0xbe5a003d;
                                                                      				if (( *( *((intOrPtr*)( *0xbe5ad500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0xbe5a003d;
                                                                      				E00007FF87FF8BE59AE90(_v20,  *((intOrPtr*)( *0xbe5ad500 + _v20 * 8)));
                                                                      				if (( *( *((intOrPtr*)( *0xbe5ad500 + _v20 * 8)) + 0x18) & 0x00000083) == 0) goto 0xbe5a0024;
                                                                      				if (_a8 != 1) goto 0xbe59ffe1;
                                                                      				if (E00007FF87FF8BE59FD70( *((intOrPtr*)( *0xbe5ad500 + _v20 * 8))) == 0xffffffff) goto 0xbe59ffdf;
                                                                      				_v24 = _v24 + 1;
                                                                      				goto 0xbe5a0024;
                                                                      				if (_a8 != 0) goto 0xbe5a0024;
                                                                      				if (( *( *((intOrPtr*)( *0xbe5ad500 + _v20 * 8)) + 0x18) & 0x00000002) == 0) goto 0xbe5a0024;
                                                                      				if (E00007FF87FF8BE59FD70( *((intOrPtr*)( *0xbe5ad500 + _v20 * 8))) != 0xffffffff) goto 0xbe5a0024;
                                                                      				_v16 = 0xffffffff;
                                                                      				E00007FF87FF8BE59AF60(_v20,  *((intOrPtr*)( *0xbe5ad500 + _v20 * 8)));
                                                                      				goto L1;
                                                                      				__ecx = 1;
                                                                      				__eax = E00007FF87FF8BE589360(__eax, 1);
                                                                      				if (_a8 != 1) goto 0xbe5a005b;
                                                                      				__eax = _v24;
                                                                      				goto 0xbe5a005f;
                                                                      				__eax = _v16;
                                                                      				return _v16;
                                                                      			}






                                                                      0x7ff8be59ff00
                                                                      0x7ff8be59ff08
                                                                      0x7ff8be59ff10
                                                                      0x7ff8be59ff1d
                                                                      0x7ff8be59ff23
                                                                      0x7ff8be59ff33
                                                                      0x7ff8be59ff41
                                                                      0x7ff8be59ff58
                                                                      0x7ff8be59ff78
                                                                      0x7ff8be59ff92
                                                                      0x7ff8be59ffb2
                                                                      0x7ff8be59ffb9
                                                                      0x7ff8be59ffd3
                                                                      0x7ff8be59ffdb
                                                                      0x7ff8be59ffdf
                                                                      0x7ff8be59ffe6
                                                                      0x7ff8be5a0000
                                                                      0x7ff8be5a001a
                                                                      0x7ff8be5a001c
                                                                      0x7ff8be5a0038
                                                                      0x7ff8be5a003d
                                                                      0x7ff8be5a0042
                                                                      0x7ff8be5a0047
                                                                      0x7ff8be5a0051
                                                                      0x7ff8be5a0053
                                                                      0x7ff8be5a0059
                                                                      0x7ff8be5a005b
                                                                      0x7ff8be5a0063

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _fflush_nolock$_lock_file2_unlock_unlock_file2
                                                                      • String ID:
                                                                      • API String ID: 1144694634-0
                                                                      • Opcode ID: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                                      • Instruction ID: a4b1fce21a9de74e48a43d636be71e6af7fe244da727efe0a6416616390fde79
                                                                      • Opcode Fuzzy Hash: 9c48fc7a63950d59b547df98b2f037ee7aefe6eda58a35de18d9feeb54d081ae
                                                                      • Instruction Fuzzy Hash: 7241BA7691C90189EA30DB1DD8A127973E1FB88B98F501235E75E877A5CF3DE941CB10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 27%
                                                                      			E00007FF87FF8BE593CC0(void* __edx, void* __rax, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int* _a40, char _a48, signed int _a56, signed int _a64) {
                                                                      				long long _v16;
                                                                      				long long _v24;
                                                                      				intOrPtr _v32;
                                                                      				long long _v40;
                                                                      				long long _v48;
                                                                      				intOrPtr _v52;
                                                                      				intOrPtr _v56;
                                                                      				signed int _v64;
                                                                      				long long _v72;
                                                                      				char _v80;
                                                                      				long long _v88;
                                                                      				void* _t135;
                                                                      				void* _t145;
                                                                      				void* _t147;
                                                                      				void* _t148;
                                                                      				void* _t149;
                                                                      				signed int* _t200;
                                                                      				intOrPtr _t206;
                                                                      
                                                                      				_a32 = __r9;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __rcx;
                                                                      				0xbe584000();
                                                                      				if ( *((intOrPtr*)(__rax + 0x2c0)) != 0) goto 0xbe593d6c;
                                                                      				if ( *_a8 == 0xe06d7363) goto 0xbe593d6c;
                                                                      				if ( *_a8 != 0x80000029) goto 0xbe593d2a;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x18)) != 0xf) goto 0xbe593d2a;
                                                                      				if ( *((long long*)(_a8 + 0x60)) == 0x19930520) goto 0xbe593d6c;
                                                                      				if ( *_a8 == 0x80000026) goto 0xbe593d6c;
                                                                      				if (( *_a40 & 0x1fffffff) - 0x19930522 < 0) goto 0xbe593d6c;
                                                                      				if ((_a40[9] & 0x00000001) == 0) goto 0xbe593d6c;
                                                                      				goto 0xbe59409c;
                                                                      				if (( *(_a8 + 4) & 0x00000066) == 0) goto 0xbe593ef3;
                                                                      				if (_a40[1] == 0) goto 0xbe593ee4;
                                                                      				if (_a48 != 0) goto 0xbe593ee4;
                                                                      				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0xbe593e40;
                                                                      				if ( *_a8 != 0x80000026) goto 0xbe593e40;
                                                                      				_v56 = E00007FF87FF8BE593A60(_a24, _a40, _a32,  *((intOrPtr*)(_a24 + 0xf8)));
                                                                      				if (_v56 - 0xffffffff < 0) goto 0xbe593e0a;
                                                                      				if (_v56 - _a40[1] >= 0) goto 0xbe593e0a;
                                                                      				goto 0xbe593e0f;
                                                                      				E00007FF87FF8BE58CF80(_a40);
                                                                      				r9d = _v56;
                                                                      				E00007FF87FF8BE594F20(_a40, _a16, _a32, _a40);
                                                                      				goto 0xbe593ec7;
                                                                      				if (( *(_a8 + 4) & 0x00000020) == 0) goto 0xbe593ec7;
                                                                      				if ( *_a8 != 0x80000029) goto 0xbe593ec7;
                                                                      				_v48 = _a8;
                                                                      				_v52 =  *((intOrPtr*)(_v48 + 0x38));
                                                                      				if (_v52 - 0xffffffff < 0) goto 0xbe593e95;
                                                                      				if (_v52 - _a40[1] >= 0) goto 0xbe593e95;
                                                                      				goto 0xbe593e9a;
                                                                      				E00007FF87FF8BE58CF80(_a40);
                                                                      				r9d = _v52;
                                                                      				E00007FF87FF8BE594F20(_v48,  *((intOrPtr*)(_v48 + 0x28)), _a32, _a40);
                                                                      				goto 0xbe59409c;
                                                                      				E00007FF87FF8BE58E790(_v52 - _a40[1], _v48, _a16, _a32, _a40);
                                                                      				goto 0xbe594097;
                                                                      				if (_a40[3] != 0) goto 0xbe593f59;
                                                                      				if (( *_a40 & 0x1fffffff) - 0x19930521 < 0) goto 0xbe594097;
                                                                      				_t200 = _a40;
                                                                      				if ( *((intOrPtr*)(_t200 + 0x20)) == 0) goto 0xbe593f44;
                                                                      				_t135 = E00007FF87FF8BE58E680( *_a40 & 0x1fffffff, _t200);
                                                                      				_v24 = _t200 + _a40[8];
                                                                      				goto 0xbe593f4d;
                                                                      				_v24 = 0;
                                                                      				if (_v24 == 0) goto 0xbe594097;
                                                                      				if ( *_a8 != 0xe06d7363) goto 0xbe594041;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x18)) - 3 < 0) goto 0xbe594041;
                                                                      				if ( *((intOrPtr*)(_a8 + 0x20)) - 0x19930522 <= 0) goto 0xbe594041;
                                                                      				_t206 =  *((intOrPtr*)(_a8 + 0x30));
                                                                      				if ( *((intOrPtr*)(_t206 + 8)) == 0) goto 0xbe593fc5;
                                                                      				E00007FF87FF8BE58E6A0(_t135, _t206);
                                                                      				_v16 = _t206 +  *((intOrPtr*)( *((intOrPtr*)(_a8 + 0x30)) + 8));
                                                                      				goto 0xbe593fce;
                                                                      				_v16 = 0;
                                                                      				_v40 = _v16;
                                                                      				_t177 = _v40;
                                                                      				if (_v40 == 0) goto 0xbe594041;
                                                                      				_v64 = _a64 & 0x000000ff;
                                                                      				_v72 = _a56;
                                                                      				_v80 = _a48;
                                                                      				_v88 = _a40;
                                                                      				_v32 = _v40();
                                                                      				goto 0xbe594097;
                                                                      				_v64 = _a56;
                                                                      				_v72 = _a48;
                                                                      				_v80 = _a64 & 0x000000ff;
                                                                      				_v88 = _a40;
                                                                      				E00007FF87FF8BE5940B0(_t145, _t147, _t148, _t149, _t177, _a40, _a8, _a16, _a24, _a32);
                                                                      				return 1;
                                                                      			}





















                                                                      0x7ff8be593cc0
                                                                      0x7ff8be593cc5
                                                                      0x7ff8be593cca
                                                                      0x7ff8be593ccf
                                                                      0x7ff8be593cd8
                                                                      0x7ff8be593ce4
                                                                      0x7ff8be593cf8
                                                                      0x7ff8be593d08
                                                                      0x7ff8be593d16
                                                                      0x7ff8be593d28
                                                                      0x7ff8be593d38
                                                                      0x7ff8be593d4e
                                                                      0x7ff8be593d60
                                                                      0x7ff8be593d67
                                                                      0x7ff8be593d7c
                                                                      0x7ff8be593d8e
                                                                      0x7ff8be593d9c
                                                                      0x7ff8be593db2
                                                                      0x7ff8be593dc6
                                                                      0x7ff8be593dec
                                                                      0x7ff8be593df5
                                                                      0x7ff8be593e06
                                                                      0x7ff8be593e08
                                                                      0x7ff8be593e0a
                                                                      0x7ff8be593e0f
                                                                      0x7ff8be593e2c
                                                                      0x7ff8be593e3b
                                                                      0x7ff8be593e50
                                                                      0x7ff8be593e60
                                                                      0x7ff8be593e6a
                                                                      0x7ff8be593e77
                                                                      0x7ff8be593e80
                                                                      0x7ff8be593e91
                                                                      0x7ff8be593e93
                                                                      0x7ff8be593e95
                                                                      0x7ff8be593e9a
                                                                      0x7ff8be593eb8
                                                                      0x7ff8be593ec2
                                                                      0x7ff8be593edf
                                                                      0x7ff8be593eee
                                                                      0x7ff8be593eff
                                                                      0x7ff8be593f15
                                                                      0x7ff8be593f1b
                                                                      0x7ff8be593f27
                                                                      0x7ff8be593f29
                                                                      0x7ff8be593f3d
                                                                      0x7ff8be593f42
                                                                      0x7ff8be593f44
                                                                      0x7ff8be593f53
                                                                      0x7ff8be593f67
                                                                      0x7ff8be593f79
                                                                      0x7ff8be593f8e
                                                                      0x7ff8be593f9c
                                                                      0x7ff8be593fa4
                                                                      0x7ff8be593fa6
                                                                      0x7ff8be593fbe
                                                                      0x7ff8be593fc3
                                                                      0x7ff8be593fc5
                                                                      0x7ff8be593fd3
                                                                      0x7ff8be593fd8
                                                                      0x7ff8be593fde
                                                                      0x7ff8be593fe8
                                                                      0x7ff8be593ff4
                                                                      0x7ff8be594000
                                                                      0x7ff8be59400c
                                                                      0x7ff8be594035
                                                                      0x7ff8be59403f
                                                                      0x7ff8be594049
                                                                      0x7ff8be594055
                                                                      0x7ff8be594061
                                                                      0x7ff8be59406d
                                                                      0x7ff8be594092
                                                                      0x7ff8be5940a0

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _inconsistency
                                                                      • String ID: csm$csm
                                                                      • API String ID: 32975420-3733052814
                                                                      • Opcode ID: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                                      • Instruction ID: 6a17f30c2b5f4901221c978c0406583c67ba503ff8f8238dd5da3fa0777c8c27
                                                                      • Opcode Fuzzy Hash: b62b0453fdffd86c1ea8e56b24d9441da31a01f9fe07ee07632383c0adf59322
                                                                      • Instruction Fuzzy Hash: D9A1B73A60CBC5CAD6708B19E4943AAB7A0F785B95F504036EB8D87B99DF3DD844CB01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      • ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca, xrefs: 00007FF8BE58991D
                                                                      • f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c, xrefs: 00007FF8BE589932
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: __free_lconv_mon__free_lconv_num
                                                                      • String ID: ((ptloci->lc_category[category].wlocale != NULL) && (ptloci->lc_category[category].wrefcount != NULL)) || ((ptloci->lc_category[ca$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\localref.c
                                                                      • API String ID: 2148069796-2706031433
                                                                      • Opcode ID: 5d60d57c9e58d07f7621284f5e9f8ee1c279b3f05538a913626922df64b73307
                                                                      • Instruction ID: 77cc2a43603b8fef825a95991af11e7d9b4f374567e8d0d9265ef0f8f0e34052
                                                                      • Opcode Fuzzy Hash: 5d60d57c9e58d07f7621284f5e9f8ee1c279b3f05538a913626922df64b73307
                                                                      • Instruction Fuzzy Hash: C8A11D3261CA8585EB508B49E8953BEB3A0FBD4B90F455036EB9E477A6CFBCD445C700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                      • API String ID: 2123368286-3717698799
                                                                      • Opcode ID: 9007319e5b81e0e19641b6dff6978a626c4b249898d68e368399ad5d9614f895
                                                                      • Instruction ID: 8f6851055f67396a23ece75db7854c1211179f65de5cba2e497dd43507aca5d0
                                                                      • Opcode Fuzzy Hash: 9007319e5b81e0e19641b6dff6978a626c4b249898d68e368399ad5d9614f895
                                                                      • Instruction Fuzzy Hash: D981313A91DB898EDA708B58F8643A973A0F7857A4F100635E7AE437D5DF7CD4458B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 20%
                                                                      			E00007FF87FF8BE59C719(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                      				signed int _t212;
                                                                      				signed char _t217;
                                                                      				intOrPtr _t252;
                                                                      				signed int _t327;
                                                                      				signed int _t328;
                                                                      				signed long long _t331;
                                                                      				intOrPtr* _t354;
                                                                      				signed long long _t379;
                                                                      
                                                                      				_t327 = __rax;
                                                                      				_a708 = 0x27;
                                                                      				_a72 = 0x10;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59c754;
                                                                      				_a84 = 0x30;
                                                                      				_a85 = _a708 + 0x51;
                                                                      				_a92 = 2;
                                                                      				_a72 = 8;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59c777;
                                                                      				asm("bts eax, 0x9");
                                                                      				if ((_a80 & 0x00008000) == 0) goto 0xbe59c79e;
                                                                      				E00007FF87FF8BE591EA0( &_a1112);
                                                                      				_a824 = _t327;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00001000) == 0) goto 0xbe59c7c5;
                                                                      				E00007FF87FF8BE591EA0( &_a1112);
                                                                      				_a824 = _t327;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00000020) == 0) goto 0xbe59c810;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c7f6;
                                                                      				_t328 = E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t328;
                                                                      				goto 0xbe59c80e;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t328;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c834;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t328;
                                                                      				goto 0xbe59c84b;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t328;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c882;
                                                                      				if (_a824 >= 0) goto 0xbe59c882;
                                                                      				_a832 =  ~_a824;
                                                                      				asm("bts eax, 0x8");
                                                                      				goto 0xbe59c892;
                                                                      				_t331 = _a824;
                                                                      				_a832 = _t331;
                                                                      				if ((_a80 & 0x00008000) != 0) goto 0xbe59c8c7;
                                                                      				if ((_a80 & 0x00001000) != 0) goto 0xbe59c8c7;
                                                                      				_a832 = _a832 & _t331;
                                                                      				if (_a116 >= 0) goto 0xbe59c8d8;
                                                                      				_a116 = 1;
                                                                      				goto 0xbe59c8f5;
                                                                      				_a80 = _a80 & 0xfffffff7;
                                                                      				if (_a116 - 0x200 <= 0) goto 0xbe59c8f5;
                                                                      				_a116 = 0x200;
                                                                      				if (_a832 != 0) goto 0xbe59c908;
                                                                      				_a92 = 0;
                                                                      				_a64 =  &_a687;
                                                                      				_t212 = _a116;
                                                                      				_a116 = _a116 - 1;
                                                                      				if (_t212 > 0) goto 0xbe59c936;
                                                                      				if (_a832 == 0) goto 0xbe59c9d3;
                                                                      				_a1040 = _a72;
                                                                      				_a816 = _t212 / _a1040 + 0x30;
                                                                      				_a1048 = _a72;
                                                                      				if (_a816 - 0x39 <= 0) goto 0xbe59c9b2;
                                                                      				_t217 = _a816 + _a708;
                                                                      				_a816 = _t217;
                                                                      				 *_a64 = _a816 & 0x000000ff;
                                                                      				_a64 = _a64 - 1;
                                                                      				goto 0xbe59c915;
                                                                      				_a104 = _t217;
                                                                      				_a64 = _a64 + 1;
                                                                      				if ((_a80 & 0x00000200) == 0) goto 0xbe59ca31;
                                                                      				if (_a104 == 0) goto 0xbe59ca12;
                                                                      				if ( *_a64 == 0x30) goto 0xbe59ca31;
                                                                      				_a64 = _a64 - 1;
                                                                      				 *_a64 = 0x30;
                                                                      				_a104 = _a104 + 1;
                                                                      				if (_a108 != 0) goto 0xbe59cc6e;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000100) == 0) goto 0xbe59ca63;
                                                                      				_a84 = 0x2d;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000001) == 0) goto 0xbe59ca7d;
                                                                      				_a84 = 0x2b;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000002) == 0) goto 0xbe59ca95;
                                                                      				_a84 = 0x20;
                                                                      				_a92 = 1;
                                                                      				_a840 = _a88 - _a104 - _a92;
                                                                      				if ((_a80 & 0x0000000c) != 0) goto 0xbe59cad5;
                                                                      				E00007FF87FF8BE59CF10(0x20, _a840, _a1088,  &_a688);
                                                                      				E00007FF87FF8BE59CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                      				if ((_a80 & 0x00000008) == 0) goto 0xbe59cb27;
                                                                      				if ((_a80 & 0x00000004) != 0) goto 0xbe59cb27;
                                                                      				E00007FF87FF8BE59CF10(0x30, _a840, _a1088,  &_a688);
                                                                      				if (_a76 == 0) goto 0xbe59cc1d;
                                                                      				if (_a104 <= 0) goto 0xbe59cc1d;
                                                                      				_a872 = 0;
                                                                      				_a848 = _a64;
                                                                      				_a856 = _a104;
                                                                      				_a856 = _a856 - 1;
                                                                      				if (_a856 == 0) goto 0xbe59cc1b;
                                                                      				_a1056 =  *_a848 & 0x0000ffff;
                                                                      				r9d = _a1056 & 0x0000ffff;
                                                                      				r8d = 6;
                                                                      				_a872 = E00007FF87FF8BE59B530( &_a860,  &_a864, _a1088);
                                                                      				_a848 =  &(_a848[1]);
                                                                      				if (_a872 != 0) goto 0xbe59cbe5;
                                                                      				if (_a860 != 0) goto 0xbe59cbf2;
                                                                      				_a688 = 0xffffffff;
                                                                      				goto 0xbe59cc1b;
                                                                      				E00007FF87FF8BE59CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                      				goto 0xbe59cb60;
                                                                      				goto 0xbe59cc3b;
                                                                      				E00007FF87FF8BE59CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                      				if (_a688 < 0) goto 0xbe59cc6e;
                                                                      				if ((_a80 & 0x00000004) == 0) goto 0xbe59cc6e;
                                                                      				E00007FF87FF8BE59CF10(0x20, _a840, _a1088,  &_a688);
                                                                      				if (_a96 == 0) goto 0xbe59cc8e;
                                                                      				0xbe585330();
                                                                      				_a96 = 0;
                                                                      				goto 0xbe59b99c;
                                                                      				if (_a704 == 0) goto 0xbe59ccb4;
                                                                      				if (_a704 == 7) goto 0xbe59ccb4;
                                                                      				_a1060 = 0;
                                                                      				goto 0xbe59ccbf;
                                                                      				_a1060 = 1;
                                                                      				_t252 = _a1060;
                                                                      				_a876 = _t252;
                                                                      				if (_a876 != 0) goto 0xbe59cd05;
                                                                      				_t354 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                      				_a32 = _t354;
                                                                      				r9d = 0;
                                                                      				r8d = 0x8f5;
                                                                      				0xbe58b3b0();
                                                                      				if (_t252 != 1) goto 0xbe59cd05;
                                                                      				asm("int3");
                                                                      				if (_a876 != 0) goto 0xbe59cd61;
                                                                      				0xbe58ab30();
                                                                      				 *_t354 = 0x16;
                                                                      				_a32 = 0;
                                                                      				r9d = 0x8f5;
                                                                      				E00007FF87FF8BE58BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      				_a912 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				goto 0xbe59cd80;
                                                                      				_a916 = _a688;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				return E00007FF87FF8BE583280(_a916, 2, 2, _a1064 ^ _t379, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      			}











                                                                      0x7ff8be59c719
                                                                      0x7ff8be59c719
                                                                      0x7ff8be59c724
                                                                      0x7ff8be59c737
                                                                      0x7ff8be59c739
                                                                      0x7ff8be59c748
                                                                      0x7ff8be59c74c
                                                                      0x7ff8be59c756
                                                                      0x7ff8be59c769
                                                                      0x7ff8be59c76f
                                                                      0x7ff8be59c782
                                                                      0x7ff8be59c78c
                                                                      0x7ff8be59c791
                                                                      0x7ff8be59c799
                                                                      0x7ff8be59c7a9
                                                                      0x7ff8be59c7b3
                                                                      0x7ff8be59c7b8
                                                                      0x7ff8be59c7c0
                                                                      0x7ff8be59c7ce
                                                                      0x7ff8be59c7d9
                                                                      0x7ff8be59c7e8
                                                                      0x7ff8be59c7ec
                                                                      0x7ff8be59c7f4
                                                                      0x7ff8be59c7fe
                                                                      0x7ff8be59c806
                                                                      0x7ff8be59c80e
                                                                      0x7ff8be59c819
                                                                      0x7ff8be59c823
                                                                      0x7ff8be59c82a
                                                                      0x7ff8be59c832
                                                                      0x7ff8be59c83c
                                                                      0x7ff8be59c843
                                                                      0x7ff8be59c854
                                                                      0x7ff8be59c85f
                                                                      0x7ff8be59c86c
                                                                      0x7ff8be59c878
                                                                      0x7ff8be59c880
                                                                      0x7ff8be59c882
                                                                      0x7ff8be59c88a
                                                                      0x7ff8be59c89d
                                                                      0x7ff8be59c8aa
                                                                      0x7ff8be59c8bf
                                                                      0x7ff8be59c8cc
                                                                      0x7ff8be59c8ce
                                                                      0x7ff8be59c8d6
                                                                      0x7ff8be59c8df
                                                                      0x7ff8be59c8eb
                                                                      0x7ff8be59c8ed
                                                                      0x7ff8be59c8fe
                                                                      0x7ff8be59c900
                                                                      0x7ff8be59c910
                                                                      0x7ff8be59c915
                                                                      0x7ff8be59c91f
                                                                      0x7ff8be59c925
                                                                      0x7ff8be59c930
                                                                      0x7ff8be59c93b
                                                                      0x7ff8be59c95e
                                                                      0x7ff8be59c96a
                                                                      0x7ff8be59c997
                                                                      0x7ff8be59c9a9
                                                                      0x7ff8be59c9ab
                                                                      0x7ff8be59c9bf
                                                                      0x7ff8be59c9c9
                                                                      0x7ff8be59c9ce
                                                                      0x7ff8be59c9e0
                                                                      0x7ff8be59c9ec
                                                                      0x7ff8be59c9fc
                                                                      0x7ff8be59ca03
                                                                      0x7ff8be59ca10
                                                                      0x7ff8be59ca1a
                                                                      0x7ff8be59ca24
                                                                      0x7ff8be59ca2d
                                                                      0x7ff8be59ca36
                                                                      0x7ff8be59ca45
                                                                      0x7ff8be59ca52
                                                                      0x7ff8be59ca54
                                                                      0x7ff8be59ca59
                                                                      0x7ff8be59ca61
                                                                      0x7ff8be59ca6c
                                                                      0x7ff8be59ca6e
                                                                      0x7ff8be59ca73
                                                                      0x7ff8be59ca7b
                                                                      0x7ff8be59ca86
                                                                      0x7ff8be59ca88
                                                                      0x7ff8be59ca8d
                                                                      0x7ff8be59caa5
                                                                      0x7ff8be59cab5
                                                                      0x7ff8be59cad0
                                                                      0x7ff8be59caee
                                                                      0x7ff8be59cafc
                                                                      0x7ff8be59cb07
                                                                      0x7ff8be59cb22
                                                                      0x7ff8be59cb2c
                                                                      0x7ff8be59cb37
                                                                      0x7ff8be59cb3d
                                                                      0x7ff8be59cb4d
                                                                      0x7ff8be59cb59
                                                                      0x7ff8be59cb70
                                                                      0x7ff8be59cb79
                                                                      0x7ff8be59cb8a
                                                                      0x7ff8be59cb92
                                                                      0x7ff8be59cb9b
                                                                      0x7ff8be59cbb6
                                                                      0x7ff8be59cbc9
                                                                      0x7ff8be59cbd9
                                                                      0x7ff8be59cbe3
                                                                      0x7ff8be59cbe5
                                                                      0x7ff8be59cbf0
                                                                      0x7ff8be59cc11
                                                                      0x7ff8be59cc16
                                                                      0x7ff8be59cc1b
                                                                      0x7ff8be59cc36
                                                                      0x7ff8be59cc43
                                                                      0x7ff8be59cc4e
                                                                      0x7ff8be59cc69
                                                                      0x7ff8be59cc74
                                                                      0x7ff8be59cc80
                                                                      0x7ff8be59cc85
                                                                      0x7ff8be59cc8e
                                                                      0x7ff8be59cc9b
                                                                      0x7ff8be59cca5
                                                                      0x7ff8be59cca7
                                                                      0x7ff8be59ccb2
                                                                      0x7ff8be59ccb4
                                                                      0x7ff8be59ccbf
                                                                      0x7ff8be59ccc6
                                                                      0x7ff8be59ccd5
                                                                      0x7ff8be59ccd7
                                                                      0x7ff8be59ccde
                                                                      0x7ff8be59cce3
                                                                      0x7ff8be59cce6
                                                                      0x7ff8be59ccf8
                                                                      0x7ff8be59cd00
                                                                      0x7ff8be59cd02
                                                                      0x7ff8be59cd0d
                                                                      0x7ff8be59cd0f
                                                                      0x7ff8be59cd14
                                                                      0x7ff8be59cd1a
                                                                      0x7ff8be59cd23
                                                                      0x7ff8be59cd3e
                                                                      0x7ff8be59cd43
                                                                      0x7ff8be59cd53
                                                                      0x7ff8be59cd5f
                                                                      0x7ff8be59cd68
                                                                      0x7ff8be59cd74
                                                                      0x7ff8be59cd97

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg
                                                                      • String ID: '$0$9
                                                                      • API String ID: 1967237116-269856862
                                                                      • Opcode ID: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                                      • Instruction ID: f7273553028f7d77ef6fb4c3f4dd23953b3ea33207f082997fd96bcdf38a4c30
                                                                      • Opcode Fuzzy Hash: 83c439eea7fc9ce93bcb821b911d608e7d80de2d13083439c5735137d4fc31ad
                                                                      • Instruction Fuzzy Hash: A441C53660DAC18BE775CB19E8A17AAB7A4F785790F100129E79C86B98DB7CE540CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$CreateDestroyedExceptionFindInfoObjectUnlink
                                                                      • String ID: csm
                                                                      • API String ID: 2005287440-1018135373
                                                                      • Opcode ID: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                                      • Instruction ID: 7cfab418a33bf2e057120e3134f8ff82fba1482f74536560fec2ee86536f3d5f
                                                                      • Opcode Fuzzy Hash: 4c556ceed80f2aba1954f9041ed191ad0fbab56fa1f8ad9f2457e70616e7d401
                                                                      • Instruction Fuzzy Hash: 1E51E43660CB86C6DA609F1AE4A03AEB7A0F7C4B90F514135EB9D47BA5EF39D450CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Buffer too small", 0)$_vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                      • API String ID: 2123368286-3717698799
                                                                      • Opcode ID: 902fc8e7192f88527d8aa4075598999d81e9371814558b5bb1293b80f5ddf804
                                                                      • Instruction ID: cf5103ba0df9caf4ae04dd22080eb9e4d22189515f6ef18bd26f8470c5b3a460
                                                                      • Opcode Fuzzy Hash: 902fc8e7192f88527d8aa4075598999d81e9371814558b5bb1293b80f5ddf804
                                                                      • Instruction Fuzzy Hash: 5E413E3991CA8A8EEB709B28F8643B962A0FB853A4F504735D7AD427D5DF7CD4848B01
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: CountCriticalFileInitializeSectionSpinType_calloc_dbg_calloc_dbg_impl
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\ioinit.c
                                                                      • API String ID: 2306298712-3864165772
                                                                      • Opcode ID: 98820b60ce2df4739f8eede7b66bb299315cc4206aaa59dfd9cab9f4cbb121a8
                                                                      • Instruction ID: a42bff7dbc2ad9e408c56d015cc5545c15b1e397d588671f4267e7eac068ee99
                                                                      • Opcode Fuzzy Hash: 98820b60ce2df4739f8eede7b66bb299315cc4206aaa59dfd9cab9f4cbb121a8
                                                                      • Instruction Fuzzy Hash: A0315722A0DAC689E7708B19E86076AB3A5FB85790F408335DBAD877D9DF3CD540CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: _wcstombs_s_l$bufferSize <= INT_MAX$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                                      • API String ID: 2123368286-2562677240
                                                                      • Opcode ID: f1a9f826516545701b922f50b6ebdc9d8be9d112825cbb7a30042366d5f9c4a9
                                                                      • Instruction ID: 0471aa32967085a8410d538a7c153771e5b31e2b004327f745da180abd44a2ea
                                                                      • Opcode Fuzzy Hash: f1a9f826516545701b922f50b6ebdc9d8be9d112825cbb7a30042366d5f9c4a9
                                                                      • Instruction Fuzzy Hash: 1931073690CB8689E6709B18E8643AAB6A5FB853D4F500236D7AD03BE8DF7CD444CB41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter$__doserrno
                                                                      • String ID: (str != NULL)$_fclose_nolock$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c
                                                                      • API String ID: 1181141450-2845860089
                                                                      • Opcode ID: 60dcfdadd0e03516a84dc335c67980ba4999d51805a5974115e67aa140ed36a2
                                                                      • Instruction ID: 9b9e0db61e03c3d60c70a886d94cfdad297c806d967ab889919c70bf449329f8
                                                                      • Opcode Fuzzy Hash: 60dcfdadd0e03516a84dc335c67980ba4999d51805a5974115e67aa140ed36a2
                                                                      • Instruction Fuzzy Hash: 9A313A3292CA428AE7609B19E8A476A77A0FB80794F502131E79E477E5DF3CD4408F50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (fh >= 0 && (unsigned)fh < (unsigned)_nhandle)$_isatty$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isatty.c
                                                                      • API String ID: 2123368286-160817255
                                                                      • Opcode ID: eccc8fed36cae0d9a6e14cbb0507e08d02c226084f69b474f0b5454228c7b857
                                                                      • Instruction ID: e0ea130bcfff124af6baafbbc056fe89c8e11cc2316fef649dbae718c345af0f
                                                                      • Opcode Fuzzy Hash: eccc8fed36cae0d9a6e14cbb0507e08d02c226084f69b474f0b5454228c7b857
                                                                      • Instruction Fuzzy Hash: 1A21957691C6428EE7609B18EC643B9B3A2FB803D5F406635E39D476D6DF7CD4408B10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (stream != NULL)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fclose.c$fclose
                                                                      • API String ID: 2123368286-3409824857
                                                                      • Opcode ID: d31558689191b30e1debc2aa339dabcf4ed505ad636b5f29a69950b4dd90694d
                                                                      • Instruction ID: 5d665bdbd7c93479fca16043b060d9ef84989c987c25fe848af58c842a8805fe
                                                                      • Opcode Fuzzy Hash: d31558689191b30e1debc2aa339dabcf4ed505ad636b5f29a69950b4dd90694d
                                                                      • Instruction Fuzzy Hash: 55213E7192C6428EE7609B28E8A476A77A0FB847D4F402135F79E47695CFBCD844CB50
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_
                                                                      • String ID: (unsigned)(c + 1) <= 256$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\isctype.c
                                                                      • API String ID: 1901436342-3621827421
                                                                      • Opcode ID: 291659c115524f578e2ce7e37289a3f2ddc7b5bd59cb83b4eaeda8d1fa0b4c89
                                                                      • Instruction ID: 241e5c6c5448db4c3662125b52230ac431daf7c25aba6b254f7f289435a969fa
                                                                      • Opcode Fuzzy Hash: 291659c115524f578e2ce7e37289a3f2ddc7b5bd59cb83b4eaeda8d1fa0b4c89
                                                                      • Instruction Fuzzy Hash: 5521013291CA818AE750DB58E8A156EB7A0FBC4780F504031E79E83AE6DF7CD404CF40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: ("Invalid error_mode", 0)$_set_error_mode$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\errmode.c
                                                                      • API String ID: 2123368286-2972513288
                                                                      • Opcode ID: 8fb5a3cdd681d6a82b02ff81c277c719a79eaaec91177dc4ca99e8a0364f32ec
                                                                      • Instruction ID: 71dbc753fab53cffd5df32c32413845c534262595ee5c46fe1f41af64173a221
                                                                      • Opcode Fuzzy Hash: 8fb5a3cdd681d6a82b02ff81c277c719a79eaaec91177dc4ca99e8a0364f32ec
                                                                      • Instruction Fuzzy Hash: 6221E87991C2469EE7608B1CFC647AA76A4BB443C4F402535F74A876A5DF7CE944CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$string != NULL && sizeInBytes > 0
                                                                      • API String ID: 2123368286-367560414
                                                                      • Opcode ID: 9835c0e10505228e0bf6b58a8474be5f834255bb2e0cd334fa5f5b7dd6645e21
                                                                      • Instruction ID: 698d2bd737f862e8d3537199f0349e8f49f64d62846f0cddbfa5fd4680e17a47
                                                                      • Opcode Fuzzy Hash: 9835c0e10505228e0bf6b58a8474be5f834255bb2e0cd334fa5f5b7dd6645e21
                                                                      • Instruction Fuzzy Hash: AC112B3990C64A8EF7708B18FC653EA66A4FB943C4F505139D39D46AE6DF7DE4888B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: _wcstombs_l_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c$pwcs != NULL
                                                                      • API String ID: 2123368286-2992382544
                                                                      • Opcode ID: 9cdd31bc13f045a84d1723aba15172f6d66e597d1102c0836733c4c00faf9839
                                                                      • Instruction ID: b92438e20e27a320087204eb20c33d12910850a1eaac819c20044f5b99f6ed7f
                                                                      • Opcode Fuzzy Hash: 9cdd31bc13f045a84d1723aba15172f6d66e597d1102c0836733c4c00faf9839
                                                                      • Instruction Fuzzy Hash: 3711283590CA86ADE6708B28E8753FA6299FB44394F905336C3AD426D5DF3DD1848B40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (stream != NULL)$_fileno$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\fileno.c
                                                                      • API String ID: 2123368286-3532421942
                                                                      • Opcode ID: c9b4c7eaa6f702e756935e157fc704da053bc53339d856ee334f13e3a5237ddc
                                                                      • Instruction ID: 09c164fbdd4d2e5dabdaf6e1db76a4660ef1c46447c42ea47dc8be256a62bae5
                                                                      • Opcode Fuzzy Hash: c9b4c7eaa6f702e756935e157fc704da053bc53339d856ee334f13e3a5237ddc
                                                                      • Instruction Fuzzy Hash: 9311307592C646CEF7A09B18EC647AA73A4FB40394F402235F79D03A95DF7CD5598B00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (dst != NULL && sizeInBytes > 0) || (dst == NULL && sizeInBytes == 0)$_wcstombs_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\wcstombs.c
                                                                      • API String ID: 2123368286-152112980
                                                                      • Opcode ID: bee2d7726ac50f9e7da98411c921f1d389d1484d621cac995bcaec902168c7d6
                                                                      • Instruction ID: a930fb3913cbb24e12a81943b998ad55b144634617c0ee541d3a122a54d4bfac
                                                                      • Opcode Fuzzy Hash: bee2d7726ac50f9e7da98411c921f1d389d1484d621cac995bcaec902168c7d6
                                                                      • Instruction Fuzzy Hash: E011183590C6869DF7709B68E8243EAB7A8FB50384F901236D78C466D5CF7DE8888B41
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _unlock$CurrentThreadValue_calloc_dbg_calloc_dbg_impl
                                                                      • String ID: f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dllcrt0.c
                                                                      • API String ID: 433497747-929597301
                                                                      • Opcode ID: ca63128539c1a66789b61801abc51d1c22395d203c51a8dfbb4cf18a799a6b77
                                                                      • Instruction ID: 5e697677d4c6d5a67a552633298224f2596a85dedcd809e381602e4fe9f4bf24
                                                                      • Opcode Fuzzy Hash: ca63128539c1a66789b61801abc51d1c22395d203c51a8dfbb4cf18a799a6b77
                                                                      • Instruction Fuzzy Hash: 88012D35A2D6428AE3609B5CEC6577A6360FB84BD1F505232EBBE426D6DF3CE4008600
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (count == 0) || (string != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                      • API String ID: 2123368286-3131718208
                                                                      • Opcode ID: 43b2844285fd77a1982b218cfc07c90d3f3fad476d4107e0837d5d8b2ccbe159
                                                                      • Instruction ID: 3de2c2e4279f127e840f473366a8ee9c9f942efcaec77d102538238b401a2a46
                                                                      • Opcode Fuzzy Hash: 43b2844285fd77a1982b218cfc07c90d3f3fad476d4107e0837d5d8b2ccbe159
                                                                      • Instruction Fuzzy Hash: 9B115B79A0C6468EF7609B28F8243AA66D4FB54388F505235D7AC036E5DF7DE548CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: (format != NULL)$_vsnprintf_helper$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c
                                                                      • API String ID: 2123368286-1927795013
                                                                      • Opcode ID: 98ed0b5fdb5fc60e70232fca9ee65f87cb4d2692f01eaf8ea89a3da70423e3bd
                                                                      • Instruction ID: fd0c503b204cd6c481078079f0d0a8892b3c596665062d626be8be0259bfadd7
                                                                      • Opcode Fuzzy Hash: 98ed0b5fdb5fc60e70232fca9ee65f87cb4d2692f01eaf8ea89a3da70423e3bd
                                                                      • Instruction Fuzzy Hash: 53010439E0C64A8EF7608B28F8257AA26A4BB403D4F901236E75C036E6DF7CE545CB11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: _vsnprintf_s_l$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\vsprintf.c$format != NULL
                                                                      • API String ID: 2123368286-577066449
                                                                      • Opcode ID: e471ef19857bf677b9863c0521a2362ee6eb8c4f9ff1322e4db10fa111c1afe4
                                                                      • Instruction ID: a5889ccac233c96d3fe1f4b24f2d8e3054c025881d2ece178ac11788098e4806
                                                                      • Opcode Fuzzy Hash: e471ef19857bf677b9863c0521a2362ee6eb8c4f9ff1322e4db10fa111c1afe4
                                                                      • Instruction Fuzzy Hash: A0017C39A0C60A8EF7609B18FC613E976A4EB543D4F902235E79D42AE5DF3DE5448B40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter
                                                                      • String ID: _msize_dbg$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgheap.c$pUserData != NULL
                                                                      • API String ID: 2123368286-563024394
                                                                      • Opcode ID: 4f42008d2eeb6119988a971f0b8ebe92e3bb2dd5d0d6607e11ba140e367e8579
                                                                      • Instruction ID: 5a89f04640365bba050c9dd2b13fc16a211c90a59a361cacddf61c3dee37ce29
                                                                      • Opcode Fuzzy Hash: 4f42008d2eeb6119988a971f0b8ebe92e3bb2dd5d0d6607e11ba140e367e8579
                                                                      • Instruction Fuzzy Hash: 06015E3590C6068EF7709B28EC613A572A1BB407A5F501231D36C06AD6EF3DD5458B40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: AddressHandleModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 1646373207-1276376045
                                                                      • Opcode ID: 5b280635b15effc0f011d898b8b9467002935a92ac88a45419cb005d03af6660
                                                                      • Instruction ID: 04f7abe9a00128e1a72e3c5c262b9747d0081e4565704e6d8c5755e68c0a49d5
                                                                      • Opcode Fuzzy Hash: 5b280635b15effc0f011d898b8b9467002935a92ac88a45419cb005d03af6660
                                                                      • Instruction Fuzzy Hash: 38F01C3590CA4286D230DF08F858329BB60FB84388F401235E78E42674CF3CD648CA00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 41%
                                                                      			E00007FF87FF8BE5A0C80(signed int __ecx, void* __eflags, void* __rax, void* __r8, signed int _a8) {
                                                                      				signed long long _v16;
                                                                      				long _v24;
                                                                      				void* _t57;
                                                                      				signed long long _t59;
                                                                      
                                                                      				_t57 = __rax;
                                                                      				_a8 = __ecx;
                                                                      				E00007FF87FF8BE59F900(_a8);
                                                                      				if (_t57 == 0xffffffff) goto 0xbe5a0d05;
                                                                      				if (_a8 != 1) goto 0xbe5a0cb3;
                                                                      				if (( *( *0xbe5ae560 + 0xb8) & 0x00000001) != 0) goto 0xbe5a0ccc;
                                                                      				if (_a8 != 2) goto 0xbe5a0cef;
                                                                      				_t59 =  *0xbe5ae560;
                                                                      				if (( *(_t59 + 0x60) & 0x00000001) == 0) goto 0xbe5a0cef;
                                                                      				E00007FF87FF8BE59F900(1);
                                                                      				_v16 = _t59;
                                                                      				E00007FF87FF8BE59F900(2);
                                                                      				if (_v16 == _t59) goto 0xbe5a0d05;
                                                                      				E00007FF87FF8BE59F900(_a8);
                                                                      				if (CloseHandle(??) == 0) goto 0xbe5a0d0f;
                                                                      				_v24 = 0;
                                                                      				goto 0xbe5a0d19;
                                                                      				_v24 = GetLastError();
                                                                      				E00007FF87FF8BE59F7D0(_a8, _t59);
                                                                      				 *((char*)( *((intOrPtr*)(0xbe5ae560 + _t59 * 8)) + 8 + (_a8 & 0x0000001f) * 0x58)) = 0;
                                                                      				if (_v24 == 0) goto 0xbe5a0d60;
                                                                      				E00007FF87FF8BE58AA70(_v24,  *((intOrPtr*)(0xbe5ae560 + _t59 * 8)));
                                                                      				goto 0xbe5a0d62;
                                                                      				return 0;
                                                                      			}







                                                                      0x7ff8be5a0c80
                                                                      0x7ff8be5a0c80
                                                                      0x7ff8be5a0c8c
                                                                      0x7ff8be5a0c95
                                                                      0x7ff8be5a0c9c
                                                                      0x7ff8be5a0cb1
                                                                      0x7ff8be5a0cb8
                                                                      0x7ff8be5a0cba
                                                                      0x7ff8be5a0cca
                                                                      0x7ff8be5a0cd1
                                                                      0x7ff8be5a0cd6
                                                                      0x7ff8be5a0ce0
                                                                      0x7ff8be5a0ced
                                                                      0x7ff8be5a0cf3
                                                                      0x7ff8be5a0d03
                                                                      0x7ff8be5a0d05
                                                                      0x7ff8be5a0d0d
                                                                      0x7ff8be5a0d15
                                                                      0x7ff8be5a0d1d
                                                                      0x7ff8be5a0d44
                                                                      0x7ff8be5a0d4e
                                                                      0x7ff8be5a0d54
                                                                      0x7ff8be5a0d5e
                                                                      0x7ff8be5a0d66

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast__doserrno_dosmaperr_free_osfhnd
                                                                      • String ID:
                                                                      • API String ID: 1551955814-0
                                                                      • Opcode ID: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                                      • Instruction ID: 0a039a1fc109be23c10eeafaf96b19690048276eb6a1c0bcd08ae15de5a77f65
                                                                      • Opcode Fuzzy Hash: 539147ec8a9783b9fa5ff2985af3543efd94603151f732987cc3c022e13e7d90
                                                                      • Instruction Fuzzy Hash: 06218332A1C6468EE6309B18EC7127AB7A2FB85394F141235E79E467E5DF2CE841CB10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: FormatLocaleThread$DateTime
                                                                      • String ID:
                                                                      • API String ID: 3587784874-0
                                                                      • Opcode ID: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                                      • Instruction ID: eff78aa5b37fdb5d72ecc71fdc81461a93f2bf099d42eef0ab8baea171c02874
                                                                      • Opcode Fuzzy Hash: 6ab24f3c8d7cd050487db91c395009c2fe45c414da0b1ba1062a45228bb8b770
                                                                      • Instruction Fuzzy Hash: B211EC3260CB808AE3208F69F84015ABBA0FB48BE4F548734EFAD47B99DE3CD1418700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 35%
                                                                      			E00007FF87FF8BE594960(void* __ecx, long long __rcx, long long __rdx, long long __r8, long long __r9, void* _a8, long long _a16, long long _a24, long long _a32, signed int _a40, intOrPtr _a48, long long _a56, long long _a64) {
                                                                      				long long _v24;
                                                                      				long long _v32;
                                                                      				long long _v40;
                                                                      				long long _v48;
                                                                      				long long _v56;
                                                                      				char _v60;
                                                                      				char _v64;
                                                                      				signed int _v72;
                                                                      				char _v80;
                                                                      				char _v88;
                                                                      				long long _v96;
                                                                      				intOrPtr _v104;
                                                                      				long long _v112;
                                                                      				long long _v120;
                                                                      				long long _v128;
                                                                      				signed int _v136;
                                                                      				void* _t106;
                                                                      				void* _t117;
                                                                      				void* _t118;
                                                                      				void* _t119;
                                                                      				void* _t120;
                                                                      				void* _t121;
                                                                      				long long _t153;
                                                                      				signed int _t161;
                                                                      				signed int _t165;
                                                                      				long long _t166;
                                                                      				long long _t169;
                                                                      				long long _t170;
                                                                      				intOrPtr _t174;
                                                                      
                                                                      				_a32 = __r9;
                                                                      				_a24 = __r8;
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __rcx;
                                                                      				_t153 = _a8;
                                                                      				if ( *_t153 != 0x80000003) goto 0xbe594990;
                                                                      				goto 0xbe594cc6;
                                                                      				0xbe584000();
                                                                      				if ( *((long long*)(_t153 + 0xe0)) == 0) goto 0xbe594a33;
                                                                      				0xbe584000();
                                                                      				_v56 = _t153;
                                                                      				E00007FF87FF8BE583D00(_t106);
                                                                      				if ( *((intOrPtr*)(_v56 + 0xe0)) == _t153) goto 0xbe594a33;
                                                                      				if ( *_a8 == 0xe0434f4d) goto 0xbe594a33;
                                                                      				if ( *_a8 == 0xe0434352) goto 0xbe594a33;
                                                                      				_v120 = _a64;
                                                                      				_v128 = _a56;
                                                                      				_v136 = _a40;
                                                                      				if (E00007FF87FF8BE58E9B0(_a8, _a16, _a24, _a32) == 0) goto 0xbe594a33;
                                                                      				goto 0xbe594cc6;
                                                                      				if ( *((intOrPtr*)(_a40 + 0xc)) == 0) goto 0xbe594a43;
                                                                      				goto 0xbe594a48;
                                                                      				E00007FF87FF8BE58CF80(_a40);
                                                                      				_v120 = _a32;
                                                                      				_v128 =  &_v60;
                                                                      				_t161 =  &_v64;
                                                                      				_v136 = _t161;
                                                                      				r9d = _a48;
                                                                      				r8d = _a56;
                                                                      				E00007FF87FF8BE58EA30(_a16, _a40);
                                                                      				_v72 = _t161;
                                                                      				_v64 = _v64 + 1;
                                                                      				_v72 = _v72 + 0x14;
                                                                      				if (_v64 - _v60 >= 0) goto 0xbe594cc6;
                                                                      				if (_a48 -  *_v72 < 0) goto 0xbe594c2b;
                                                                      				_t165 = _v72;
                                                                      				if (_a48 -  *((intOrPtr*)(_t165 + 4)) > 0) goto 0xbe594c2b;
                                                                      				_t117 = E00007FF87FF8BE58E680( *((intOrPtr*)(_t165 + 4)), _t165);
                                                                      				_t166 = _t165 +  *((intOrPtr*)(_v72 + 0x10));
                                                                      				if ( *((intOrPtr*)(_t166 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0xbe594b53;
                                                                      				_t118 = E00007FF87FF8BE58E680(_t117, _t166);
                                                                      				_v48 = _t166;
                                                                      				_t119 = E00007FF87FF8BE58E680(_t118, _t166);
                                                                      				_t169 = _v48 +  *((intOrPtr*)(_t166 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                                      				_v40 = _t169;
                                                                      				goto 0xbe594b5f;
                                                                      				_v40 = 0;
                                                                      				if (_v40 == 0) goto 0xbe594bff;
                                                                      				_t120 = E00007FF87FF8BE58E680(_t119, _t169);
                                                                      				_t170 = _t169 +  *((intOrPtr*)(_v72 + 0x10));
                                                                      				if ( *((intOrPtr*)(_t170 + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14)) == 0) goto 0xbe594be3;
                                                                      				_t121 = E00007FF87FF8BE58E680(_t120, _t170);
                                                                      				_v32 = _t170;
                                                                      				E00007FF87FF8BE58E680(_t121, _t170);
                                                                      				_v24 = _v32 +  *((intOrPtr*)(_t170 +  *((intOrPtr*)(_v72 + 0x10)) + 4 + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14));
                                                                      				goto 0xbe594bef;
                                                                      				_v24 = 0;
                                                                      				_t174 = _v24;
                                                                      				if ( *((char*)(_t174 + 0x10)) != 0) goto 0xbe594c2b;
                                                                      				E00007FF87FF8BE58E680( *((char*)(_t174 + 0x10)), _t174);
                                                                      				if (( *(_t174 +  *((intOrPtr*)(_v72 + 0x10)) + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14) & 0x00000040) == 0) goto 0xbe594c30;
                                                                      				goto L1;
                                                                      				__eax = E00007FF87FF8BE58E680(__eax, __rax);
                                                                      				_v72 =  *((intOrPtr*)(_v72 + 0x10));
                                                                      				__rax = __rax +  *((intOrPtr*)(_v72 + 0x10));
                                                                      				_v72 =  *((intOrPtr*)(_v72 + 0xc)) - 1;
                                                                      				__rcx = ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                                      				__rax = __rax + ( *((intOrPtr*)(_v72 + 0xc)) - 1) * 0x14;
                                                                      				__eflags = __rax;
                                                                      				_v80 = 0;
                                                                      				_v88 = 1;
                                                                      				__rcx = _a64;
                                                                      				_v96 = _a64;
                                                                      				_v104 = _a56;
                                                                      				__rcx = _v72;
                                                                      				_v112 = _v72;
                                                                      				_v120 = 0;
                                                                      				_v128 = __rax;
                                                                      				__rax = _a40;
                                                                      				_v136 = _a40;
                                                                      				__r9 = _a32;
                                                                      				__r8 = _a24;
                                                                      				__rdx = _a16;
                                                                      				__rcx = _a8;
                                                                      				__eax = E00007FF87FF8BE595180(__edi, __esi, __esp, __eflags, _a8, _a16, _a24, _a32);
                                                                      				goto L1;
                                                                      				return __eax;
                                                                      			}
































                                                                      0x7ff8be594960
                                                                      0x7ff8be594965
                                                                      0x7ff8be59496a
                                                                      0x7ff8be59496f
                                                                      0x7ff8be59497b
                                                                      0x7ff8be594989
                                                                      0x7ff8be59498b
                                                                      0x7ff8be594990
                                                                      0x7ff8be59499d
                                                                      0x7ff8be5949a3
                                                                      0x7ff8be5949a8
                                                                      0x7ff8be5949ad
                                                                      0x7ff8be5949be
                                                                      0x7ff8be5949ce
                                                                      0x7ff8be5949de
                                                                      0x7ff8be5949e8
                                                                      0x7ff8be5949f4
                                                                      0x7ff8be594a00
                                                                      0x7ff8be594a2c
                                                                      0x7ff8be594a2e
                                                                      0x7ff8be594a3f
                                                                      0x7ff8be594a41
                                                                      0x7ff8be594a43
                                                                      0x7ff8be594a50
                                                                      0x7ff8be594a5a
                                                                      0x7ff8be594a5f
                                                                      0x7ff8be594a64
                                                                      0x7ff8be594a69
                                                                      0x7ff8be594a71
                                                                      0x7ff8be594a89
                                                                      0x7ff8be594a8e
                                                                      0x7ff8be594a9b
                                                                      0x7ff8be594aa8
                                                                      0x7ff8be594ab5
                                                                      0x7ff8be594ac9
                                                                      0x7ff8be594acf
                                                                      0x7ff8be594ade
                                                                      0x7ff8be594ae4
                                                                      0x7ff8be594af2
                                                                      0x7ff8be594b0b
                                                                      0x7ff8be594b0d
                                                                      0x7ff8be594b12
                                                                      0x7ff8be594b17
                                                                      0x7ff8be594b46
                                                                      0x7ff8be594b49
                                                                      0x7ff8be594b51
                                                                      0x7ff8be594b53
                                                                      0x7ff8be594b68
                                                                      0x7ff8be594b6e
                                                                      0x7ff8be594b7c
                                                                      0x7ff8be594b95
                                                                      0x7ff8be594b97
                                                                      0x7ff8be594b9c
                                                                      0x7ff8be594ba4
                                                                      0x7ff8be594bd9
                                                                      0x7ff8be594be1
                                                                      0x7ff8be594be3
                                                                      0x7ff8be594bef
                                                                      0x7ff8be594bfd
                                                                      0x7ff8be594bff
                                                                      0x7ff8be594c29
                                                                      0x7ff8be594c2b
                                                                      0x7ff8be594c30
                                                                      0x7ff8be594c3a
                                                                      0x7ff8be594c3e
                                                                      0x7ff8be594c4b
                                                                      0x7ff8be594c4e
                                                                      0x7ff8be594c52
                                                                      0x7ff8be594c52
                                                                      0x7ff8be594c55
                                                                      0x7ff8be594c5a
                                                                      0x7ff8be594c5f
                                                                      0x7ff8be594c67
                                                                      0x7ff8be594c73
                                                                      0x7ff8be594c77
                                                                      0x7ff8be594c7c
                                                                      0x7ff8be594c81
                                                                      0x7ff8be594c8a
                                                                      0x7ff8be594c8f
                                                                      0x7ff8be594c97
                                                                      0x7ff8be594c9c
                                                                      0x7ff8be594ca4
                                                                      0x7ff8be594cac
                                                                      0x7ff8be594cb4
                                                                      0x7ff8be594cbc
                                                                      0x7ff8be594cc1
                                                                      0x7ff8be594ccd

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 0-2084237596
                                                                      • Opcode ID: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                                      • Instruction ID: fd74b74fcc44b5c3279d8fc79d2fa8722547f4bdbda05005345d420eaa69af3e
                                                                      • Opcode Fuzzy Hash: ff3899ab70367f580fbe79aa5854b52896b6d0a2cba9891fdbb3d09f9aae126f
                                                                      • Instruction Fuzzy Hash: 9791EB3660DB858ADA64DB49E4A13AEB361FBC5784F104436EB8E87B95DF3CE441CB40
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 19%
                                                                      			E00007FF87FF8BE59C6F8(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, char _a85, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a688, intOrPtr _a704, intOrPtr _a708, signed char _a816, signed int _a824, signed int _a832, intOrPtr _a840, signed short* _a848, signed char _a856, char _a860, char _a864, long long _a872, intOrPtr _a876, intOrPtr _a912, intOrPtr _a916, signed int _a1040, long long _a1048, signed short _a1056, long long _a1060, signed int _a1064, intOrPtr _a1088, char _a1112) {
                                                                      				signed int _t217;
                                                                      				signed char _t222;
                                                                      				intOrPtr _t257;
                                                                      				signed int _t332;
                                                                      				signed int _t333;
                                                                      				signed long long _t336;
                                                                      				intOrPtr* _t359;
                                                                      				signed long long _t384;
                                                                      
                                                                      				_t332 = __rax;
                                                                      				_a116 = 0x10;
                                                                      				asm("bts eax, 0xf");
                                                                      				_a708 = 7;
                                                                      				_a708 = 0x27;
                                                                      				_a72 = 0x10;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59c754;
                                                                      				_a84 = 0x30;
                                                                      				_a85 = _a708 + 0x51;
                                                                      				_a92 = 2;
                                                                      				_a72 = 8;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59c777;
                                                                      				asm("bts eax, 0x9");
                                                                      				if ((_a80 & 0x00008000) == 0) goto 0xbe59c79e;
                                                                      				E00007FF87FF8BE591EA0( &_a1112);
                                                                      				_a824 = _t332;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00001000) == 0) goto 0xbe59c7c5;
                                                                      				E00007FF87FF8BE591EA0( &_a1112);
                                                                      				_a824 = _t332;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00000020) == 0) goto 0xbe59c810;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c7f6;
                                                                      				_t333 = E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t333;
                                                                      				goto 0xbe59c80e;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t333;
                                                                      				goto 0xbe59c84b;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c834;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t333;
                                                                      				goto 0xbe59c84b;
                                                                      				E00007FF87FF8BE591E40( &_a1112);
                                                                      				_a824 = _t333;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59c882;
                                                                      				if (_a824 >= 0) goto 0xbe59c882;
                                                                      				_a832 =  ~_a824;
                                                                      				asm("bts eax, 0x8");
                                                                      				goto 0xbe59c892;
                                                                      				_t336 = _a824;
                                                                      				_a832 = _t336;
                                                                      				if ((_a80 & 0x00008000) != 0) goto 0xbe59c8c7;
                                                                      				if ((_a80 & 0x00001000) != 0) goto 0xbe59c8c7;
                                                                      				_a832 = _a832 & _t336;
                                                                      				if (_a116 >= 0) goto 0xbe59c8d8;
                                                                      				_a116 = 1;
                                                                      				goto 0xbe59c8f5;
                                                                      				_a80 = _a80 & 0xfffffff7;
                                                                      				if (_a116 - 0x200 <= 0) goto 0xbe59c8f5;
                                                                      				_a116 = 0x200;
                                                                      				if (_a832 != 0) goto 0xbe59c908;
                                                                      				_a92 = 0;
                                                                      				_a64 =  &_a687;
                                                                      				_t217 = _a116;
                                                                      				_a116 = _a116 - 1;
                                                                      				if (_t217 > 0) goto 0xbe59c936;
                                                                      				if (_a832 == 0) goto 0xbe59c9d3;
                                                                      				_a1040 = _a72;
                                                                      				_a816 = _t217 / _a1040 + 0x30;
                                                                      				_a1048 = _a72;
                                                                      				if (_a816 - 0x39 <= 0) goto 0xbe59c9b2;
                                                                      				_t222 = _a816 + _a708;
                                                                      				_a816 = _t222;
                                                                      				 *_a64 = _a816 & 0x000000ff;
                                                                      				_a64 = _a64 - 1;
                                                                      				goto 0xbe59c915;
                                                                      				_a104 = _t222;
                                                                      				_a64 = _a64 + 1;
                                                                      				if ((_a80 & 0x00000200) == 0) goto 0xbe59ca31;
                                                                      				if (_a104 == 0) goto 0xbe59ca12;
                                                                      				if ( *_a64 == 0x30) goto 0xbe59ca31;
                                                                      				_a64 = _a64 - 1;
                                                                      				 *_a64 = 0x30;
                                                                      				_a104 = _a104 + 1;
                                                                      				if (_a108 != 0) goto 0xbe59cc6e;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000100) == 0) goto 0xbe59ca63;
                                                                      				_a84 = 0x2d;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000001) == 0) goto 0xbe59ca7d;
                                                                      				_a84 = 0x2b;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ca95;
                                                                      				if ((_a80 & 0x00000002) == 0) goto 0xbe59ca95;
                                                                      				_a84 = 0x20;
                                                                      				_a92 = 1;
                                                                      				_a840 = _a88 - _a104 - _a92;
                                                                      				if ((_a80 & 0x0000000c) != 0) goto 0xbe59cad5;
                                                                      				E00007FF87FF8BE59CF10(0x20, _a840, _a1088,  &_a688);
                                                                      				E00007FF87FF8BE59CF60(_a92, _a64,  &_a84, _a1088,  &_a688);
                                                                      				if ((_a80 & 0x00000008) == 0) goto 0xbe59cb27;
                                                                      				if ((_a80 & 0x00000004) != 0) goto 0xbe59cb27;
                                                                      				E00007FF87FF8BE59CF10(0x30, _a840, _a1088,  &_a688);
                                                                      				if (_a76 == 0) goto 0xbe59cc1d;
                                                                      				if (_a104 <= 0) goto 0xbe59cc1d;
                                                                      				_a872 = 0;
                                                                      				_a848 = _a64;
                                                                      				_a856 = _a104;
                                                                      				_a856 = _a856 - 1;
                                                                      				if (_a856 == 0) goto 0xbe59cc1b;
                                                                      				_a1056 =  *_a848 & 0x0000ffff;
                                                                      				r9d = _a1056 & 0x0000ffff;
                                                                      				r8d = 6;
                                                                      				_a872 = E00007FF87FF8BE59B530( &_a860,  &_a864, _a1088);
                                                                      				_a848 =  &(_a848[1]);
                                                                      				if (_a872 != 0) goto 0xbe59cbe5;
                                                                      				if (_a860 != 0) goto 0xbe59cbf2;
                                                                      				_a688 = 0xffffffff;
                                                                      				goto 0xbe59cc1b;
                                                                      				E00007FF87FF8BE59CF60(_a860,  &(_a848[1]),  &_a864, _a1088,  &_a688);
                                                                      				goto 0xbe59cb60;
                                                                      				goto 0xbe59cc3b;
                                                                      				E00007FF87FF8BE59CF60(_a104,  &(_a848[1]), _a64, _a1088,  &_a688);
                                                                      				if (_a688 < 0) goto 0xbe59cc6e;
                                                                      				if ((_a80 & 0x00000004) == 0) goto 0xbe59cc6e;
                                                                      				E00007FF87FF8BE59CF10(0x20, _a840, _a1088,  &_a688);
                                                                      				if (_a96 == 0) goto 0xbe59cc8e;
                                                                      				0xbe585330();
                                                                      				_a96 = 0;
                                                                      				goto 0xbe59b99c;
                                                                      				if (_a704 == 0) goto 0xbe59ccb4;
                                                                      				if (_a704 == 7) goto 0xbe59ccb4;
                                                                      				_a1060 = 0;
                                                                      				goto 0xbe59ccbf;
                                                                      				_a1060 = 1;
                                                                      				_t257 = _a1060;
                                                                      				_a876 = _t257;
                                                                      				if (_a876 != 0) goto 0xbe59cd05;
                                                                      				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                      				_a32 = _t359;
                                                                      				r9d = 0;
                                                                      				r8d = 0x8f5;
                                                                      				0xbe58b3b0();
                                                                      				if (_t257 != 1) goto 0xbe59cd05;
                                                                      				asm("int3");
                                                                      				if (_a876 != 0) goto 0xbe59cd61;
                                                                      				0xbe58ab30();
                                                                      				 *_t359 = 0x16;
                                                                      				_a32 = 0;
                                                                      				r9d = 0x8f5;
                                                                      				E00007FF87FF8BE58BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      				_a912 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				goto 0xbe59cd80;
                                                                      				_a916 = _a688;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				return E00007FF87FF8BE583280(_a916, 2, 2, _a1064 ^ _t384, L"_output_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      			}











                                                                      0x7ff8be59c6f8
                                                                      0x7ff8be59c6f8
                                                                      0x7ff8be59c704
                                                                      0x7ff8be59c70c
                                                                      0x7ff8be59c719
                                                                      0x7ff8be59c724
                                                                      0x7ff8be59c737
                                                                      0x7ff8be59c739
                                                                      0x7ff8be59c748
                                                                      0x7ff8be59c74c
                                                                      0x7ff8be59c756
                                                                      0x7ff8be59c769
                                                                      0x7ff8be59c76f
                                                                      0x7ff8be59c782
                                                                      0x7ff8be59c78c
                                                                      0x7ff8be59c791
                                                                      0x7ff8be59c799
                                                                      0x7ff8be59c7a9
                                                                      0x7ff8be59c7b3
                                                                      0x7ff8be59c7b8
                                                                      0x7ff8be59c7c0
                                                                      0x7ff8be59c7ce
                                                                      0x7ff8be59c7d9
                                                                      0x7ff8be59c7e8
                                                                      0x7ff8be59c7ec
                                                                      0x7ff8be59c7f4
                                                                      0x7ff8be59c7fe
                                                                      0x7ff8be59c806
                                                                      0x7ff8be59c80e
                                                                      0x7ff8be59c819
                                                                      0x7ff8be59c823
                                                                      0x7ff8be59c82a
                                                                      0x7ff8be59c832
                                                                      0x7ff8be59c83c
                                                                      0x7ff8be59c843
                                                                      0x7ff8be59c854
                                                                      0x7ff8be59c85f
                                                                      0x7ff8be59c86c
                                                                      0x7ff8be59c878
                                                                      0x7ff8be59c880
                                                                      0x7ff8be59c882
                                                                      0x7ff8be59c88a
                                                                      0x7ff8be59c89d
                                                                      0x7ff8be59c8aa
                                                                      0x7ff8be59c8bf
                                                                      0x7ff8be59c8cc
                                                                      0x7ff8be59c8ce
                                                                      0x7ff8be59c8d6
                                                                      0x7ff8be59c8df
                                                                      0x7ff8be59c8eb
                                                                      0x7ff8be59c8ed
                                                                      0x7ff8be59c8fe
                                                                      0x7ff8be59c900
                                                                      0x7ff8be59c910
                                                                      0x7ff8be59c915
                                                                      0x7ff8be59c91f
                                                                      0x7ff8be59c925
                                                                      0x7ff8be59c930
                                                                      0x7ff8be59c93b
                                                                      0x7ff8be59c95e
                                                                      0x7ff8be59c96a
                                                                      0x7ff8be59c997
                                                                      0x7ff8be59c9a9
                                                                      0x7ff8be59c9ab
                                                                      0x7ff8be59c9bf
                                                                      0x7ff8be59c9c9
                                                                      0x7ff8be59c9ce
                                                                      0x7ff8be59c9e0
                                                                      0x7ff8be59c9ec
                                                                      0x7ff8be59c9fc
                                                                      0x7ff8be59ca03
                                                                      0x7ff8be59ca10
                                                                      0x7ff8be59ca1a
                                                                      0x7ff8be59ca24
                                                                      0x7ff8be59ca2d
                                                                      0x7ff8be59ca36
                                                                      0x7ff8be59ca45
                                                                      0x7ff8be59ca52
                                                                      0x7ff8be59ca54
                                                                      0x7ff8be59ca59
                                                                      0x7ff8be59ca61
                                                                      0x7ff8be59ca6c
                                                                      0x7ff8be59ca6e
                                                                      0x7ff8be59ca73
                                                                      0x7ff8be59ca7b
                                                                      0x7ff8be59ca86
                                                                      0x7ff8be59ca88
                                                                      0x7ff8be59ca8d
                                                                      0x7ff8be59caa5
                                                                      0x7ff8be59cab5
                                                                      0x7ff8be59cad0
                                                                      0x7ff8be59caee
                                                                      0x7ff8be59cafc
                                                                      0x7ff8be59cb07
                                                                      0x7ff8be59cb22
                                                                      0x7ff8be59cb2c
                                                                      0x7ff8be59cb37
                                                                      0x7ff8be59cb3d
                                                                      0x7ff8be59cb4d
                                                                      0x7ff8be59cb59
                                                                      0x7ff8be59cb70
                                                                      0x7ff8be59cb79
                                                                      0x7ff8be59cb8a
                                                                      0x7ff8be59cb92
                                                                      0x7ff8be59cb9b
                                                                      0x7ff8be59cbb6
                                                                      0x7ff8be59cbc9
                                                                      0x7ff8be59cbd9
                                                                      0x7ff8be59cbe3
                                                                      0x7ff8be59cbe5
                                                                      0x7ff8be59cbf0
                                                                      0x7ff8be59cc11
                                                                      0x7ff8be59cc16
                                                                      0x7ff8be59cc1b
                                                                      0x7ff8be59cc36
                                                                      0x7ff8be59cc43
                                                                      0x7ff8be59cc4e
                                                                      0x7ff8be59cc69
                                                                      0x7ff8be59cc74
                                                                      0x7ff8be59cc80
                                                                      0x7ff8be59cc85
                                                                      0x7ff8be59cc8e
                                                                      0x7ff8be59cc9b
                                                                      0x7ff8be59cca5
                                                                      0x7ff8be59cca7
                                                                      0x7ff8be59ccb2
                                                                      0x7ff8be59ccb4
                                                                      0x7ff8be59ccbf
                                                                      0x7ff8be59ccc6
                                                                      0x7ff8be59ccd5
                                                                      0x7ff8be59ccd7
                                                                      0x7ff8be59ccde
                                                                      0x7ff8be59cce3
                                                                      0x7ff8be59cce6
                                                                      0x7ff8be59ccf8
                                                                      0x7ff8be59cd00
                                                                      0x7ff8be59cd02
                                                                      0x7ff8be59cd0d
                                                                      0x7ff8be59cd0f
                                                                      0x7ff8be59cd14
                                                                      0x7ff8be59cd1a
                                                                      0x7ff8be59cd23
                                                                      0x7ff8be59cd3e
                                                                      0x7ff8be59cd43
                                                                      0x7ff8be59cd53
                                                                      0x7ff8be59cd5f
                                                                      0x7ff8be59cd68
                                                                      0x7ff8be59cd74
                                                                      0x7ff8be59cd97

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg
                                                                      • String ID: 0$9
                                                                      • API String ID: 1967237116-1975997740
                                                                      • Opcode ID: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                                      • Instruction ID: b25221d083ffeec8bd4e3f26bb2317b77cee1f23c5bd1dc0e50f897b20c5c623
                                                                      • Opcode Fuzzy Hash: aed7fbe3ab945623e5c36a128674cf35c8ffbba07ad38133e4628ccf625e54aa
                                                                      • Instruction Fuzzy Hash: CE41C73660DAC18BE775CB19E8917AAB7A4F784790F100129E78D8AB98DB7CE540CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 23%
                                                                      			E00007FF87FF8BE59E70C(signed int __rax, void* __rdx, long long _a32, void* _a64, void* _a72, intOrPtr _a76, signed int _a80, char _a84, short _a86, intOrPtr _a88, long long _a92, long long _a96, signed char _a104, intOrPtr _a108, signed int _a116, char _a120, char _a687, char _a1200, signed short _a1212, intOrPtr _a1216, intOrPtr _a1220, signed char _a1296, signed int _a1304, signed int _a1312, intOrPtr _a1320, long long _a1328, signed char _a1336, intOrPtr _a1340, intOrPtr _a1344, intOrPtr _a1376, intOrPtr _a1380, signed int _a1480, long long _a1488, long long _a1496, long long _a1504, signed int _a1512, intOrPtr _a1536, char _a1560) {
                                                                      				signed int _t213;
                                                                      				signed char _t218;
                                                                      				void* _t249;
                                                                      				intOrPtr _t257;
                                                                      				signed int _t331;
                                                                      				signed int _t332;
                                                                      				signed long long _t335;
                                                                      				intOrPtr* _t354;
                                                                      				intOrPtr* _t359;
                                                                      				signed long long _t389;
                                                                      
                                                                      				_t331 = __rax;
                                                                      				_a1220 = 0x27;
                                                                      				_a72 = 0x10;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59e74d;
                                                                      				_a84 = 0x30;
                                                                      				_a86 = _a1220 + 0x51;
                                                                      				_a92 = 2;
                                                                      				_a72 = 8;
                                                                      				if ((_a80 & 0x00000080) == 0) goto 0xbe59e770;
                                                                      				asm("bts eax, 0x9");
                                                                      				if ((_a80 & 0x00008000) == 0) goto 0xbe59e797;
                                                                      				E00007FF87FF8BE591EA0( &_a1560);
                                                                      				_a1304 = _t331;
                                                                      				goto 0xbe59e844;
                                                                      				if ((_a80 & 0x00001000) == 0) goto 0xbe59e7be;
                                                                      				E00007FF87FF8BE591EA0( &_a1560);
                                                                      				_a1304 = _t331;
                                                                      				goto 0xbe59e844;
                                                                      				if ((_a80 & 0x00000020) == 0) goto 0xbe59e809;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59e7ef;
                                                                      				_t332 = E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t332;
                                                                      				goto 0xbe59e807;
                                                                      				E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t332;
                                                                      				goto 0xbe59e844;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59e82d;
                                                                      				E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t332;
                                                                      				goto 0xbe59e844;
                                                                      				E00007FF87FF8BE591E40( &_a1560);
                                                                      				_a1304 = _t332;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59e87b;
                                                                      				if (_a1304 >= 0) goto 0xbe59e87b;
                                                                      				_a1312 =  ~_a1304;
                                                                      				asm("bts eax, 0x8");
                                                                      				goto 0xbe59e88b;
                                                                      				_t335 = _a1304;
                                                                      				_a1312 = _t335;
                                                                      				if ((_a80 & 0x00008000) != 0) goto 0xbe59e8c0;
                                                                      				if ((_a80 & 0x00001000) != 0) goto 0xbe59e8c0;
                                                                      				_a1312 = _a1312 & _t335;
                                                                      				if (_a116 >= 0) goto 0xbe59e8d1;
                                                                      				_a116 = 1;
                                                                      				goto 0xbe59e8ee;
                                                                      				_a80 = _a80 & 0xfffffff7;
                                                                      				if (_a116 - 0x200 <= 0) goto 0xbe59e8ee;
                                                                      				_a116 = 0x200;
                                                                      				if (_a1312 != 0) goto 0xbe59e901;
                                                                      				_a92 = 0;
                                                                      				_a64 =  &_a687;
                                                                      				_t213 = _a116;
                                                                      				_a116 = _a116 - 1;
                                                                      				if (_t213 > 0) goto 0xbe59e92f;
                                                                      				if (_a1312 == 0) goto 0xbe59e9cc;
                                                                      				_a1480 = _a72;
                                                                      				_a1296 = _t213 / _a1480 + 0x30;
                                                                      				_a1488 = _a72;
                                                                      				if (_a1296 - 0x39 <= 0) goto 0xbe59e9ab;
                                                                      				_t218 = _a1296 + _a1220;
                                                                      				_a1296 = _t218;
                                                                      				 *_a64 = _a1296 & 0x000000ff;
                                                                      				_a64 = _a64 - 1;
                                                                      				goto 0xbe59e90e;
                                                                      				_a104 = _t218;
                                                                      				_a64 = _a64 + 1;
                                                                      				if ((_a80 & 0x00000200) == 0) goto 0xbe59ea2a;
                                                                      				if (_a104 == 0) goto 0xbe59ea0b;
                                                                      				if ( *_a64 == 0x30) goto 0xbe59ea2a;
                                                                      				_a64 = _a64 - 1;
                                                                      				 *_a64 = 0x30;
                                                                      				_a104 = _a104 + 1;
                                                                      				if (_a108 != 0) goto 0xbe59ec7c;
                                                                      				if ((_a80 & 0x00000040) == 0) goto 0xbe59ea9d;
                                                                      				if ((_a80 & 0x00000100) == 0) goto 0xbe59ea61;
                                                                      				_a84 = 0x2d;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ea9d;
                                                                      				if ((_a80 & 0x00000001) == 0) goto 0xbe59ea80;
                                                                      				_a84 = 0x2b;
                                                                      				_a92 = 1;
                                                                      				goto 0xbe59ea9d;
                                                                      				if ((_a80 & 0x00000002) == 0) goto 0xbe59ea9d;
                                                                      				_a84 = 0x20;
                                                                      				_a92 = 1;
                                                                      				_a1320 = _a88 - _a104 - _a92;
                                                                      				if ((_a80 & 0x0000000c) != 0) goto 0xbe59eadf;
                                                                      				E00007FF87FF8BE59EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                      				E00007FF87FF8BE59EF10(_a92, _a64,  &_a84, _a1536,  &_a1200);
                                                                      				if ((_a80 & 0x00000008) == 0) goto 0xbe59eb33;
                                                                      				if ((_a80 & 0x00000004) != 0) goto 0xbe59eb33;
                                                                      				E00007FF87FF8BE59EEC0(0x30, _a1320, _a1536,  &_a1200);
                                                                      				if (_a76 != 0) goto 0xbe59ec29;
                                                                      				if (_a104 <= 0) goto 0xbe59ec29;
                                                                      				_t354 = _a64;
                                                                      				_a1328 = _t354;
                                                                      				_a1336 = _a104;
                                                                      				_a1336 = _a1336 - 1;
                                                                      				if (_a1336 <= 0) goto 0xbe59ec27;
                                                                      				_t249 = E00007FF87FF8BE586840(_a1336,  &_a120);
                                                                      				_a1496 = _t354;
                                                                      				E00007FF87FF8BE586840(_t249,  &_a120);
                                                                      				_a1340 = E00007FF87FF8BE59F000( &_a1212, _a1328,  *((intOrPtr*)( *_t354 + 0x10c)), _a1496);
                                                                      				if (_a1340 > 0) goto 0xbe59ebe7;
                                                                      				_a1200 = 0xffffffff;
                                                                      				goto 0xbe59ec27;
                                                                      				E00007FF87FF8BE59EE40(_a1212 & 0x0000ffff, _a1536,  &_a1200);
                                                                      				_a1328 = _a1328 + _a1340;
                                                                      				goto 0xbe59eb61;
                                                                      				goto 0xbe59ec47;
                                                                      				E00007FF87FF8BE59EF10(_a104, _a1328 + _a1340, _a64, _a1536,  &_a1200);
                                                                      				if (_a1200 < 0) goto 0xbe59ec7c;
                                                                      				if ((_a80 & 0x00000004) == 0) goto 0xbe59ec7c;
                                                                      				E00007FF87FF8BE59EEC0(0x20, _a1320, _a1536,  &_a1200);
                                                                      				if (_a96 == 0) goto 0xbe59ec9c;
                                                                      				0xbe585330();
                                                                      				_a96 = 0;
                                                                      				goto 0xbe59da75;
                                                                      				if (_a1216 == 0) goto 0xbe59ecc2;
                                                                      				if (_a1216 == 7) goto 0xbe59ecc2;
                                                                      				_a1504 = 0;
                                                                      				goto 0xbe59eccd;
                                                                      				_a1504 = 1;
                                                                      				_t257 = _a1504;
                                                                      				_a1344 = _t257;
                                                                      				if (_a1344 != 0) goto 0xbe59ed13;
                                                                      				_t359 = L"((state == ST_NORMAL) || (state == ST_TYPE))";
                                                                      				_a32 = _t359;
                                                                      				r9d = 0;
                                                                      				r8d = 0x8f5;
                                                                      				0xbe58b3b0();
                                                                      				if (_t257 != 1) goto 0xbe59ed13;
                                                                      				asm("int3");
                                                                      				if (_a1344 != 0) goto 0xbe59ed6f;
                                                                      				0xbe58ab30();
                                                                      				 *_t359 = 0x16;
                                                                      				_a32 = 0;
                                                                      				r9d = 0x8f5;
                                                                      				E00007FF87FF8BE58BD70(L"((state == ST_NORMAL) || (state == ST_TYPE))", L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      				_a1376 = 0xffffffff;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				goto 0xbe59ed8e;
                                                                      				_a1380 = _a1200;
                                                                      				E00007FF87FF8BE586800( &_a120);
                                                                      				return E00007FF87FF8BE583280(_a1380, 2, 2, _a1512 ^ _t389, L"_woutput_s_l", L"f:\\dd\\vctools\\crt_bld\\self_64_amd64\\crt\\src\\output.c");
                                                                      			}













                                                                      0x7ff8be59e70c
                                                                      0x7ff8be59e70c
                                                                      0x7ff8be59e717
                                                                      0x7ff8be59e72a
                                                                      0x7ff8be59e731
                                                                      0x7ff8be59e740
                                                                      0x7ff8be59e745
                                                                      0x7ff8be59e74f
                                                                      0x7ff8be59e762
                                                                      0x7ff8be59e768
                                                                      0x7ff8be59e77b
                                                                      0x7ff8be59e785
                                                                      0x7ff8be59e78a
                                                                      0x7ff8be59e792
                                                                      0x7ff8be59e7a2
                                                                      0x7ff8be59e7ac
                                                                      0x7ff8be59e7b1
                                                                      0x7ff8be59e7b9
                                                                      0x7ff8be59e7c7
                                                                      0x7ff8be59e7d2
                                                                      0x7ff8be59e7e1
                                                                      0x7ff8be59e7e5
                                                                      0x7ff8be59e7ed
                                                                      0x7ff8be59e7f7
                                                                      0x7ff8be59e7ff
                                                                      0x7ff8be59e807
                                                                      0x7ff8be59e812
                                                                      0x7ff8be59e81c
                                                                      0x7ff8be59e823
                                                                      0x7ff8be59e82b
                                                                      0x7ff8be59e835
                                                                      0x7ff8be59e83c
                                                                      0x7ff8be59e84d
                                                                      0x7ff8be59e858
                                                                      0x7ff8be59e865
                                                                      0x7ff8be59e871
                                                                      0x7ff8be59e879
                                                                      0x7ff8be59e87b
                                                                      0x7ff8be59e883
                                                                      0x7ff8be59e896
                                                                      0x7ff8be59e8a3
                                                                      0x7ff8be59e8b8
                                                                      0x7ff8be59e8c5
                                                                      0x7ff8be59e8c7
                                                                      0x7ff8be59e8cf
                                                                      0x7ff8be59e8d8
                                                                      0x7ff8be59e8e4
                                                                      0x7ff8be59e8e6
                                                                      0x7ff8be59e8f7
                                                                      0x7ff8be59e8f9
                                                                      0x7ff8be59e909
                                                                      0x7ff8be59e90e
                                                                      0x7ff8be59e918
                                                                      0x7ff8be59e91e
                                                                      0x7ff8be59e929
                                                                      0x7ff8be59e934
                                                                      0x7ff8be59e957
                                                                      0x7ff8be59e963
                                                                      0x7ff8be59e990
                                                                      0x7ff8be59e9a2
                                                                      0x7ff8be59e9a4
                                                                      0x7ff8be59e9b8
                                                                      0x7ff8be59e9c2
                                                                      0x7ff8be59e9c7
                                                                      0x7ff8be59e9d9
                                                                      0x7ff8be59e9e5
                                                                      0x7ff8be59e9f5
                                                                      0x7ff8be59e9fc
                                                                      0x7ff8be59ea09
                                                                      0x7ff8be59ea13
                                                                      0x7ff8be59ea1d
                                                                      0x7ff8be59ea26
                                                                      0x7ff8be59ea2f
                                                                      0x7ff8be59ea3e
                                                                      0x7ff8be59ea4b
                                                                      0x7ff8be59ea52
                                                                      0x7ff8be59ea57
                                                                      0x7ff8be59ea5f
                                                                      0x7ff8be59ea6a
                                                                      0x7ff8be59ea71
                                                                      0x7ff8be59ea76
                                                                      0x7ff8be59ea7e
                                                                      0x7ff8be59ea89
                                                                      0x7ff8be59ea90
                                                                      0x7ff8be59ea95
                                                                      0x7ff8be59eaad
                                                                      0x7ff8be59eabd
                                                                      0x7ff8be59eada
                                                                      0x7ff8be59eaf8
                                                                      0x7ff8be59eb06
                                                                      0x7ff8be59eb11
                                                                      0x7ff8be59eb2e
                                                                      0x7ff8be59eb38
                                                                      0x7ff8be59eb43
                                                                      0x7ff8be59eb49
                                                                      0x7ff8be59eb4e
                                                                      0x7ff8be59eb5a
                                                                      0x7ff8be59eb71
                                                                      0x7ff8be59eb7a
                                                                      0x7ff8be59eb85
                                                                      0x7ff8be59eb8a
                                                                      0x7ff8be59eb97
                                                                      0x7ff8be59ebc9
                                                                      0x7ff8be59ebd8
                                                                      0x7ff8be59ebda
                                                                      0x7ff8be59ebe5
                                                                      0x7ff8be59ebff
                                                                      0x7ff8be59ec1a
                                                                      0x7ff8be59ec22
                                                                      0x7ff8be59ec27
                                                                      0x7ff8be59ec42
                                                                      0x7ff8be59ec4f
                                                                      0x7ff8be59ec5a
                                                                      0x7ff8be59ec77
                                                                      0x7ff8be59ec82
                                                                      0x7ff8be59ec8e
                                                                      0x7ff8be59ec93
                                                                      0x7ff8be59ec9c
                                                                      0x7ff8be59eca9
                                                                      0x7ff8be59ecb3
                                                                      0x7ff8be59ecb5
                                                                      0x7ff8be59ecc0
                                                                      0x7ff8be59ecc2
                                                                      0x7ff8be59eccd
                                                                      0x7ff8be59ecd4
                                                                      0x7ff8be59ece3
                                                                      0x7ff8be59ece5
                                                                      0x7ff8be59ecec
                                                                      0x7ff8be59ecf1
                                                                      0x7ff8be59ecf4
                                                                      0x7ff8be59ed06
                                                                      0x7ff8be59ed0e
                                                                      0x7ff8be59ed10
                                                                      0x7ff8be59ed1b
                                                                      0x7ff8be59ed1d
                                                                      0x7ff8be59ed22
                                                                      0x7ff8be59ed28
                                                                      0x7ff8be59ed31
                                                                      0x7ff8be59ed4c
                                                                      0x7ff8be59ed51
                                                                      0x7ff8be59ed61
                                                                      0x7ff8be59ed6d
                                                                      0x7ff8be59ed76
                                                                      0x7ff8be59ed82
                                                                      0x7ff8be59eda5

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: get_int64_arg
                                                                      • String ID: '$9
                                                                      • API String ID: 1967237116-1823400153
                                                                      • Opcode ID: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                                      • Instruction ID: b1397670221a49c14333c9f2efc4951652ffc017c223994134ede009a35c8dc9
                                                                      • Opcode Fuzzy Hash: 96444a5ecc25f07181ec4491dd73a0df774b8fd8e649fad80ce219d3ce06daa6
                                                                      • Instruction Fuzzy Hash: CB41D23660DAC58AE7708B59E9513ABB3E4FB85791F040125E79DC6B98EFBCD4808F04
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _unlock
                                                                      • String ID: _BLOCK_TYPE_IS_VALID(pHead->nBlockUse)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\dbgdel.cpp
                                                                      • API String ID: 2480363372-1749241151
                                                                      • Opcode ID: 69826465c09442dd62c721ef0480ef2ecfb8ed15fa83514cc39f9f882c8ed808
                                                                      • Instruction ID: 2a786199d4010c0d8383f721abfc78ff2879d1443156ecbdd08180fb05586170
                                                                      • Opcode Fuzzy Hash: 69826465c09442dd62c721ef0480ef2ecfb8ed15fa83514cc39f9f882c8ed808
                                                                      • Instruction Fuzzy Hash: 83114F7AA2C6868EEBA49B5CEC657696361FB807D0F405035E74D43B95CF3CE400CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: DestroyedExceptionFindFrameObjectUnlink
                                                                      • String ID: csm
                                                                      • API String ID: 1826589669-1018135373
                                                                      • Opcode ID: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                                      • Instruction ID: e6077d9b3bfe1345259aa98d4b3d535682c209502422e7a32fdfe1082e855f4d
                                                                      • Opcode Fuzzy Hash: 34ffa76e03f6f125ffde0022bc26c820041218dfec633c9b0636301340e9056d
                                                                      • Instruction Fuzzy Hash: 21113A72948686CEDB209F7AC8A01B927A5FF95BC4F502135EB0D4B7A1DF24E981C200
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.383933085.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000002.00000002.383924454.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383979533.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.383993460.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.384001883.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff8be580000_regsvr32.jbxd
                                                                      Similarity
                                                                      • API ID: _free_nolock
                                                                      • String ID: ("Corrupted pointer passed to _freea", 0)$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\malloc.h
                                                                      • API String ID: 2882679554-3458198949
                                                                      • Opcode ID: 9de8216f17933041b20e0427cd6b955395f4fe92a776214bf069d9d6f9ded054
                                                                      • Instruction ID: 6219b196add891ba951ba3368ca5290386e70e3f4175945256fb936f5bb60990
                                                                      • Opcode Fuzzy Hash: 9de8216f17933041b20e0427cd6b955395f4fe92a776214bf069d9d6f9ded054
                                                                      • Instruction Fuzzy Hash: 07018431A1C7868AEB709B6CEC5572AB390F788380F402136E79C42FA6DFBCD0048B10
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Execution Graph

                                                                      Execution Coverage:5.9%
                                                                      Dynamic/Decrypted Code Coverage:0.6%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:1892
                                                                      Total number of Limit Nodes:49
                                                                      execution_graph 12426 7ff8be588860 HeapCreate 12427 7ff8be588891 GetVersion 12426->12427 12428 7ff8be58888d 12426->12428 12429 7ff8be5888c1 12427->12429 12430 7ff8be5888a7 HeapSetInformation 12427->12430 12429->12428 12430->12429 14015 7ff8be595260 14016 7ff8be595296 __SehTransFilter _CreateFrameInfo 14015->14016 14017 7ff8be58ed30 _FindAndUnlinkFrame 36 API calls 14016->14017 14018 7ff8be5953e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 14017->14018 12701 7ff8be591b64 12703 7ff8be591b9d 12701->12703 12702 7ff8be591bed 12703->12702 12705 7ff8be591c86 12703->12705 12707 7ff8be59ab10 12703->12707 12705->12702 12711 7ff8be599290 12705->12711 12708 7ff8be59ab23 12707->12708 12709 7ff8be59ab35 12707->12709 12708->12705 12709->12708 12710 7ff8be58bd70 _invalid_parameter 17 API calls 12709->12710 12710->12708 12712 7ff8be5992d8 12711->12712 12718 7ff8be5992b6 __doserrno 12711->12718 12713 7ff8be59938c 12712->12713 12714 7ff8be599341 __doserrno 12712->12714 12715 7ff8be59945b 12713->12715 12720 7ff8be599410 __doserrno 12713->12720 12716 7ff8be58bd70 _invalid_parameter 17 API calls 12714->12716 12725 7ff8be59fae0 12715->12725 12716->12718 12718->12702 12722 7ff8be58bd70 _invalid_parameter 17 API calls 12720->12722 12722->12718 12723 7ff8be5994a6 __doserrno 12739 7ff8be59fbc0 LeaveCriticalSection 12723->12739 12726 7ff8be59fb25 12725->12726 12727 7ff8be59fb7a 12725->12727 12730 7ff8be59fb56 12726->12730 12731 7ff8be59fb3b InitializeCriticalSectionAndSpinCount 12726->12731 12728 7ff8be599464 12727->12728 12729 7ff8be59fb81 EnterCriticalSection 12727->12729 12728->12723 12733 7ff8be599520 12728->12733 12729->12728 12740 7ff8be589360 LeaveCriticalSection 12730->12740 12731->12730 12741 7ff8be59f900 12733->12741 12735 7ff8be599545 12736 7ff8be59959d SetFilePointer 12735->12736 12738 7ff8be599552 _dosmaperr 12735->12738 12737 7ff8be5995c1 GetLastError 12736->12737 12736->12738 12737->12738 12738->12723 12739->12718 12740->12727 12742 7ff8be59f913 __doserrno 12741->12742 12743 7ff8be59f935 12741->12743 12742->12735 12744 7ff8be59f99e __doserrno 12743->12744 12746 7ff8be59f9e9 __doserrno 12743->12746 12745 7ff8be58bd70 _invalid_parameter 17 API calls 12744->12745 12745->12742 12746->12742 12747 7ff8be58bd70 _invalid_parameter 17 API calls 12746->12747 12747->12742 14019 7ff8be58405b 14020 7ff8be58406e 14019->14020 14025 7ff8be589360 LeaveCriticalSection 14020->14025 14023 7ff8be584224 14024 7ff8be5841bb _updatetlocinfoEx_nolock 14026 7ff8be589360 LeaveCriticalSection 14024->14026 14025->14024 14026->14023 14027 7ff8be58425a FlsGetValue FlsSetValue 14028 7ff8be584283 14027->14028 12752 7ff8be59bb66 12753 7ff8be59bb78 _CrtMemDumpAllObjectsSince wcsxfrm 12752->12753 12754 7ff8be59bc46 12753->12754 12756 7ff8be59b99c 12753->12756 12755 7ff8be58bd70 _invalid_parameter 17 API calls 12754->12755 12759 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 12755->12759 12757 7ff8be59cc93 12756->12757 12760 7ff8be59bada 12756->12760 12758 7ff8be58bd70 _invalid_parameter 17 API calls 12757->12758 12757->12759 12758->12759 12761 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12759->12761 12763 7ff8be58bd70 _invalid_parameter 17 API calls 12760->12763 12762 7ff8be59cd90 12761->12762 12763->12759 12764 7ff8be58e55a 12765 7ff8be58e564 12764->12765 12766 7ff8be58e5c2 RtlLookupFunctionEntry 12765->12766 12767 7ff8be58e601 12765->12767 12766->12767 14029 7ff8be59465b 14039 7ff8be59445a __SehTransFilter 14029->14039 14030 7ff8be5947d7 14031 7ff8be59485b 14030->14031 14032 7ff8be58cf80 _inconsistency 36 API calls 14030->14032 14032->14031 14033 7ff8be59466c __SehTransFilter 14033->14030 14048 7ff8be595bb0 14033->14048 14035 7ff8be594727 14035->14030 14054 7ff8be58e500 14035->14054 14039->14033 14041 7ff8be595180 14039->14041 14042 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14041->14042 14043 7ff8be5951c1 14042->14043 14044 7ff8be5951f0 __SehTransFilter 14043->14044 14062 7ff8be595970 14043->14062 14046 7ff8be58edc0 __SehTransFilter 9 API calls 14044->14046 14047 7ff8be595259 14046->14047 14047->14039 14049 7ff8be595bc6 14048->14049 14050 7ff8be595bc8 14048->14050 14052 7ff8be58cf50 terminate 35 API calls 14049->14052 14053 7ff8be595bda __SehTransFilter 14049->14053 14051 7ff8be58cf80 _inconsistency 36 API calls 14050->14051 14051->14049 14052->14053 14053->14035 14079 7ff8be593b40 14054->14079 14056 7ff8be58e539 14057 7ff8be58e5c2 RtlLookupFunctionEntry 14056->14057 14058 7ff8be58e601 14056->14058 14057->14058 14059 7ff8be58edc0 RtlUnwindEx 14058->14059 14060 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14059->14060 14061 7ff8be58eee7 14060->14061 14061->14030 14063 7ff8be595998 14062->14063 14066 7ff8be5955f0 14063->14066 14065 7ff8be5959d3 __SehTransFilter __AdjustPointer 14065->14044 14067 7ff8be59561e __SehTransFilter 14066->14067 14068 7ff8be595765 14067->14068 14070 7ff8be5956fa _ValidateRead 14067->14070 14077 7ff8be5956aa __SehTransFilter __AdjustPointer 14067->14077 14069 7ff8be59577a _ValidateRead 14068->14069 14072 7ff8be595813 __SehTransFilter 14068->14072 14073 7ff8be58cf80 _inconsistency 36 API calls 14069->14073 14069->14077 14071 7ff8be58cf80 _inconsistency 36 API calls 14070->14071 14070->14077 14071->14077 14074 7ff8be59584d _ValidateRead 14072->14074 14078 7ff8be5958c6 __SehTransFilter _ValidateExecute _ValidateRead 14072->14078 14073->14077 14076 7ff8be58cf80 _inconsistency 36 API calls 14074->14076 14074->14077 14075 7ff8be58cf80 _inconsistency 36 API calls 14075->14077 14076->14077 14077->14065 14078->14075 14078->14077 14082 7ff8be593a60 14079->14082 14083 7ff8be593a7b 14082->14083 14084 7ff8be593a7d 14082->14084 14086 7ff8be58cf80 _inconsistency 36 API calls 14083->14086 14087 7ff8be593aa5 14083->14087 14085 7ff8be58cf80 _inconsistency 36 API calls 14084->14085 14085->14083 14086->14087 14087->14056 12768 7ff8be59595c 12771 7ff8be58cf50 12768->12771 12773 7ff8be58cf59 12771->12773 12775 7ff8be5939e0 12773->12775 12776 7ff8be5939fa 12775->12776 12785 7ff8be58d430 DecodePointer 12776->12785 12778 7ff8be593a09 12779 7ff8be593a20 12778->12779 12786 7ff8be58cff0 12778->12786 12781 7ff8be593a42 12779->12781 12782 7ff8be58be50 terminate 14 API calls 12779->12782 12798 7ff8be587090 12781->12798 12782->12781 12785->12778 12787 7ff8be58d02a 12786->12787 12788 7ff8be58d1d8 DecodePointer 12787->12788 12789 7ff8be58d19a 12787->12789 12790 7ff8be58d1e8 12788->12790 12792 7ff8be58bd70 _invalid_parameter 17 API calls 12789->12792 12791 7ff8be58d1ce 12790->12791 12793 7ff8be587090 _exit 33 API calls 12790->12793 12794 7ff8be58d209 12790->12794 12791->12779 12792->12791 12793->12794 12796 7ff8be58d289 12794->12796 12801 7ff8be583d00 RtlEncodePointer 12794->12801 12796->12791 12802 7ff8be589360 LeaveCriticalSection 12796->12802 12803 7ff8be587280 12798->12803 12801->12796 12802->12791 12804 7ff8be587296 _exit 12803->12804 12805 7ff8be587368 _initterm 12804->12805 12806 7ff8be5872c7 DecodePointer 12804->12806 12824 7ff8be58744e 12804->12824 12805->12824 12827 7ff8be586210 12805->12827 12806->12805 12809 7ff8be5872e5 DecodePointer 12806->12809 12807 7ff8be58745e 12808 7ff8be5870a9 12807->12808 12811 7ff8be587520 _exit LeaveCriticalSection 12807->12811 12820 7ff8be587314 12809->12820 12812 7ff8be587479 12811->12812 12813 7ff8be5874e0 __crtExitProcess 3 API calls 12812->12813 12813->12808 12817 7ff8be58736d DecodePointer 12826 7ff8be583d00 RtlEncodePointer 12817->12826 12820->12805 12820->12817 12823 7ff8be587391 DecodePointer DecodePointer 12820->12823 12825 7ff8be583d00 RtlEncodePointer 12820->12825 12821 7ff8be587449 12840 7ff8be586f10 12821->12840 12823->12820 12824->12807 12847 7ff8be587520 12824->12847 12825->12820 12826->12820 12828 7ff8be586229 12827->12828 12829 7ff8be58628f 12828->12829 12831 7ff8be5862cb 12828->12831 12830 7ff8be58bd70 _invalid_parameter 17 API calls 12829->12830 12833 7ff8be5862c3 12830->12833 12850 7ff8be589360 LeaveCriticalSection 12831->12850 12833->12824 12834 7ff8be587100 12833->12834 12835 7ff8be587112 12834->12835 12836 7ff8be5871e4 DecodePointer 12835->12836 12837 7ff8be5871fe 12836->12837 12851 7ff8be583d00 RtlEncodePointer 12837->12851 12839 7ff8be587219 12839->12821 12852 7ff8be5863e0 12840->12852 12842 7ff8be586f8e 12845 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12842->12845 12843 7ff8be586f33 12843->12842 12860 7ff8be586660 12843->12860 12846 7ff8be586fa7 12845->12846 12846->12824 12917 7ff8be589360 LeaveCriticalSection 12847->12917 12849 7ff8be58752e 12849->12807 12850->12833 12851->12839 12853 7ff8be5863f1 12852->12853 12854 7ff8be586447 12853->12854 12857 7ff8be586480 12853->12857 12855 7ff8be58bd70 _invalid_parameter 17 API calls 12854->12855 12856 7ff8be58647b 12855->12856 12856->12843 12858 7ff8be586504 12857->12858 12864 7ff8be589360 LeaveCriticalSection 12857->12864 12858->12843 12861 7ff8be586681 _CrtMemDumpAllObjectsSince 12860->12861 12865 7ff8be586850 12861->12865 12863 7ff8be586698 _LocaleUpdate::~_LocaleUpdate 12863->12842 12864->12856 12866 7ff8be586871 12865->12866 12867 7ff8be586ba6 12866->12867 12870 7ff8be5868ed _CrtIsValidPointer 12866->12870 12895 7ff8be589360 LeaveCriticalSection 12867->12895 12869 7ff8be586bb0 12869->12863 12871 7ff8be58695e IsBadReadPtr 12870->12871 12872 7ff8be586976 12870->12872 12880 7ff8be58692f 12870->12880 12871->12872 12873 7ff8be586ad2 12872->12873 12874 7ff8be586a29 12872->12874 12875 7ff8be586add 12873->12875 12878 7ff8be586b2d 12873->12878 12876 7ff8be586abe 12874->12876 12877 7ff8be586a86 IsBadReadPtr 12874->12877 12879 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 12875->12879 12883 7ff8be586bf0 12876->12883 12877->12876 12877->12880 12878->12880 12882 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 12878->12882 12879->12880 12880->12863 12882->12880 12884 7ff8be586c28 12883->12884 12885 7ff8be586e25 _LocaleUpdate::~_LocaleUpdate 12884->12885 12886 7ff8be586c7a _CrtMemDumpAllObjectsSince 12884->12886 12887 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12885->12887 12890 7ff8be586ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 12886->12890 12896 7ff8be58c260 12886->12896 12888 7ff8be586e89 12887->12888 12888->12880 12900 7ff8be58c0c0 12890->12900 12892 7ff8be586e12 12892->12880 12893 7ff8be586dc7 12893->12892 12903 7ff8be586ea0 12893->12903 12895->12869 12897 7ff8be58c286 _CrtMemDumpAllObjectsSince wcsxfrm 12896->12897 12898 7ff8be58f4d0 _CrtMemDumpAllObjectsSince_stat 3 API calls 12897->12898 12899 7ff8be58c29d _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 12897->12899 12898->12899 12899->12890 12907 7ff8be592260 12900->12907 12902 7ff8be58c103 12902->12893 12904 7ff8be586ebd 12903->12904 12905 7ff8be586ed1 12903->12905 12904->12905 12906 7ff8be58be00 _invalid_parameter 16 API calls 12904->12906 12905->12892 12906->12905 12908 7ff8be59228b 12907->12908 12909 7ff8be5922e1 12908->12909 12912 7ff8be59231f 12908->12912 12910 7ff8be58bd70 _invalid_parameter 17 API calls 12909->12910 12914 7ff8be592315 _calloc_dbg_impl 12910->12914 12911 7ff8be592385 12913 7ff8be58bd70 _invalid_parameter 17 API calls 12911->12913 12912->12911 12915 7ff8be5923c3 _calloc_dbg_impl 12912->12915 12913->12914 12914->12902 12915->12914 12916 7ff8be58bd70 _invalid_parameter 17 API calls 12915->12916 12916->12914 12917->12849 12612 7ff8be588670 GetEnvironmentStringsW 12613 7ff8be588690 12612->12613 12615 7ff8be588697 WideCharToMultiByte 12612->12615 12616 7ff8be588733 12615->12616 12617 7ff8be58875f FreeEnvironmentStringsW 12615->12617 12616->12617 12618 7ff8be58876e WideCharToMultiByte 12616->12618 12617->12613 12619 7ff8be5887c2 FreeEnvironmentStringsW 12618->12619 12620 7ff8be5887aa 12618->12620 12619->12613 12620->12619 12929 7ff8be59e16f 12930 7ff8be59e17c _CrtMemDumpAllObjectsSince wcsxfrm get_int64_arg 12929->12930 12931 7ff8be59eadf 12930->12931 12940 7ff8be59da75 12930->12940 12952 7ff8be59eec0 12930->12952 12956 7ff8be59ef10 12931->12956 12934 7ff8be59eafd 12935 7ff8be59eb33 12934->12935 12937 7ff8be59eec0 25 API calls 12934->12937 12936 7ff8be59ec29 12935->12936 12950 7ff8be59eb49 _CrtMemDumpAllObjectsSince 12935->12950 12938 7ff8be59ebda 12936->12938 12939 7ff8be59ef10 25 API calls 12936->12939 12937->12935 12938->12940 12942 7ff8be59eec0 25 API calls 12938->12942 12939->12938 12941 7ff8be59eca1 12940->12941 12944 7ff8be59dbb5 12940->12944 12943 7ff8be58bd70 _invalid_parameter 17 API calls 12941->12943 12945 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 12941->12945 12942->12940 12943->12945 12948 7ff8be58bd70 _invalid_parameter 17 API calls 12944->12948 12946 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12945->12946 12947 7ff8be59ed9e 12946->12947 12948->12945 12950->12938 12960 7ff8be59f000 12950->12960 12967 7ff8be59ee40 12950->12967 12953 7ff8be59eed7 12952->12953 12954 7ff8be59ef07 12953->12954 12955 7ff8be59ee40 25 API calls 12953->12955 12954->12931 12955->12953 12958 7ff8be59ef2c 12956->12958 12957 7ff8be59ef4d 12957->12934 12958->12957 12959 7ff8be59ee40 25 API calls 12958->12959 12959->12958 12961 7ff8be59f026 _CrtMemDumpAllObjectsSince wcsxfrm 12960->12961 12964 7ff8be59f031 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 12960->12964 12962 7ff8be59f276 _CrtMemDumpAllObjectsSince 12961->12962 12961->12964 12965 7ff8be59f146 _CrtMemDumpAllObjectsSince 12961->12965 12963 7ff8be59f29d MultiByteToWideChar 12962->12963 12963->12964 12964->12950 12965->12964 12966 7ff8be59f1b5 MultiByteToWideChar 12965->12966 12966->12964 12968 7ff8be59ee62 12967->12968 12970 7ff8be59ee6e 12968->12970 12971 7ff8be59f360 12968->12971 12970->12950 12972 7ff8be59f719 12971->12972 12973 7ff8be59f399 12971->12973 12975 7ff8be5a0170 23 API calls 12972->12975 13006 7ff8be59f4f2 12972->13006 13007 7ff8be59afb0 12973->13007 12975->13006 12977 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12979 7ff8be59f7c5 12977->12979 12978 7ff8be59f3ed 12982 7ff8be59f4c7 12978->12982 12983 7ff8be59afb0 _fflush_nolock 17 API calls 12978->12983 12979->12970 12980 7ff8be59afb0 _fflush_nolock 17 API calls 12981 7ff8be59f3b8 12980->12981 12981->12978 12984 7ff8be59afb0 _fflush_nolock 17 API calls 12981->12984 12982->13006 13011 7ff8be5a0170 12982->13011 12986 7ff8be59f43d 12983->12986 12987 7ff8be59f3ca 12984->12987 12988 7ff8be59f484 12986->12988 12990 7ff8be59afb0 _fflush_nolock 17 API calls 12986->12990 12989 7ff8be59afb0 _fflush_nolock 17 API calls 12987->12989 12988->12982 12991 7ff8be59f561 12988->12991 12989->12978 12992 7ff8be59f44f 12990->12992 12993 7ff8be59afb0 _fflush_nolock 17 API calls 12991->12993 12992->12988 12995 7ff8be59afb0 _fflush_nolock 17 API calls 12992->12995 12994 7ff8be59f56e 12993->12994 12997 7ff8be59f5b8 12994->12997 12999 7ff8be59afb0 _fflush_nolock 17 API calls 12994->12999 12996 7ff8be59f461 12995->12996 12998 7ff8be59afb0 _fflush_nolock 17 API calls 12996->12998 12997->12972 13000 7ff8be59f604 12997->13000 12998->12988 13001 7ff8be59f580 12999->13001 13019 7ff8be59b530 13000->13019 13001->12997 13003 7ff8be59afb0 _fflush_nolock 17 API calls 13001->13003 13004 7ff8be59f592 13003->13004 13005 7ff8be59afb0 _fflush_nolock 17 API calls 13004->13005 13005->12997 13006->12977 13009 7ff8be59afc1 13007->13009 13008 7ff8be59b04b 13008->12978 13008->12980 13009->13008 13010 7ff8be58bd70 _invalid_parameter 17 API calls 13009->13010 13010->13008 13012 7ff8be5a0185 13011->13012 13013 7ff8be59afb0 _fflush_nolock 17 API calls 13012->13013 13014 7ff8be5a01c7 13013->13014 13015 7ff8be5a01dc 13014->13015 13016 7ff8be5a0326 13014->13016 13017 7ff8be59ab10 17 API calls 13014->13017 13015->13006 13016->13015 13018 7ff8be599290 23 API calls 13016->13018 13017->13016 13018->13015 13022 7ff8be59b090 13019->13022 13021 7ff8be59b56c 13021->13006 13023 7ff8be59b0b7 13022->13023 13024 7ff8be59b168 13023->13024 13025 7ff8be59b1a6 _CrtMemDumpAllObjectsSince 13023->13025 13033 7ff8be59b0c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 13023->13033 13026 7ff8be58bd70 _invalid_parameter 17 API calls 13024->13026 13027 7ff8be59b347 _CrtMemDumpAllObjectsSince 13025->13027 13031 7ff8be59b1cf 13025->13031 13026->13033 13028 7ff8be59b359 WideCharToMultiByte 13027->13028 13029 7ff8be59b3ab 13028->13029 13030 7ff8be59b3c1 GetLastError 13029->13030 13029->13033 13030->13033 13034 7ff8be59b3d0 _calloc_dbg_impl 13030->13034 13032 7ff8be58bd70 _invalid_parameter 17 API calls 13031->13032 13031->13033 13032->13033 13033->13021 13034->13033 13035 7ff8be58bd70 _invalid_parameter 17 API calls 13034->13035 13035->13033 14112 7ff8be583471 14113 7ff8be5834bc 14112->14113 14114 7ff8be58347a 14112->14114 14115 7ff8be583496 14114->14115 14124 7ff8be5870b0 14114->14124 14117 7ff8be587d00 _ioterm DeleteCriticalSection 14115->14117 14118 7ff8be58349b 14117->14118 14119 7ff8be583e00 3 API calls 14118->14119 14120 7ff8be5834a0 14119->14120 14127 7ff8be5888d0 HeapDestroy 14120->14127 14122 7ff8be5834a5 14122->14113 14123 7ff8be583e00 3 API calls 14122->14123 14123->14113 14125 7ff8be587280 _exit 33 API calls 14124->14125 14126 7ff8be5870c3 14125->14126 14126->14115 14127->14122 14128 7ff8be59dc41 14129 7ff8be59ee40 25 API calls 14128->14129 14130 7ff8be59da75 14129->14130 14131 7ff8be59eca1 14130->14131 14133 7ff8be59dbb5 14130->14133 14132 7ff8be58bd70 _invalid_parameter 17 API calls 14131->14132 14134 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 14131->14134 14132->14134 14137 7ff8be58bd70 _invalid_parameter 17 API calls 14133->14137 14135 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14134->14135 14136 7ff8be59ed9e 14135->14136 14137->14134 14138 7ff8be589240 14139 7ff8be58925f 14138->14139 14140 7ff8be58924d 14138->14140 14141 7ff8be589281 InitializeCriticalSectionAndSpinCount 14139->14141 14142 7ff8be589295 14139->14142 14141->14142 14144 7ff8be589360 LeaveCriticalSection 14142->14144 14144->14140 14145 7ff8be58ae40 14146 7ff8be58d490 std::exception::_Copy_str 17 API calls 14145->14146 14147 7ff8be58ae59 14146->14147 14148 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14147->14148 14149 7ff8be58ae86 std::exception::_Copy_str 14148->14149 14153 7ff8be58af3a std::exception::_Copy_str 14149->14153 14168 7ff8be590fd0 14149->14168 14151 7ff8be58af0d 14152 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14151->14152 14152->14153 14154 7ff8be58b2e0 14153->14154 14156 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14153->14156 14155 7ff8be58b33e 14154->14155 14157 7ff8be58d490 std::exception::_Copy_str 17 API calls 14154->14157 14158 7ff8be590cc0 25 API calls 14155->14158 14156->14154 14159 7ff8be58b311 14157->14159 14160 7ff8be58b358 14158->14160 14161 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14159->14161 14162 7ff8be58b37d 14160->14162 14163 7ff8be58cff0 terminate 34 API calls 14160->14163 14161->14155 14166 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14162->14166 14164 7ff8be58b373 14163->14164 14165 7ff8be587090 _exit 33 API calls 14164->14165 14165->14162 14167 7ff8be58b3a0 14166->14167 14170 7ff8be590ff0 __SehTransFilter 14168->14170 14171 7ff8be590ff7 14168->14171 14169 7ff8be591055 14172 7ff8be58bd70 _invalid_parameter 17 API calls 14169->14172 14170->14151 14171->14169 14173 7ff8be591093 _calloc_dbg_impl 14171->14173 14172->14170 14173->14170 14174 7ff8be591158 14173->14174 14175 7ff8be59111a 14173->14175 14174->14170 14177 7ff8be58bd70 _invalid_parameter 17 API calls 14174->14177 14176 7ff8be58bd70 _invalid_parameter 17 API calls 14175->14176 14176->14170 14177->14170 13044 7ff8be5a1140 13049 7ff8be589360 LeaveCriticalSection 13044->13049 13046 7ff8be5a1153 13050 7ff8be594e90 13046->13050 13048 7ff8be5a1179 13049->13046 13051 7ff8be594ebb 13050->13051 13052 7ff8be594ecf 13050->13052 13051->13052 13053 7ff8be58cf50 terminate 35 API calls 13051->13053 13052->13048 13053->13052 14178 7ff8be5a1040 14181 7ff8be58e8f0 14178->14181 14180 7ff8be5a108f 14182 7ff8be58e90d 14181->14182 14185 7ff8be593cc0 14182->14185 14184 7ff8be58e980 14184->14180 14186 7ff8be593cdd 14185->14186 14188 7ff8be593d82 14186->14188 14189 7ff8be593ef3 __SehTransFilter 14186->14189 14202 7ff8be593d62 14186->14202 14187 7ff8be593e40 14192 7ff8be593ec7 14187->14192 14195 7ff8be593e62 14187->14195 14188->14187 14191 7ff8be593dc8 14188->14191 14188->14202 14189->14202 14218 7ff8be5940b0 14189->14218 14193 7ff8be593a60 __StateFromControlPc 36 API calls 14191->14193 14211 7ff8be58e790 14192->14211 14196 7ff8be593dec 14193->14196 14197 7ff8be58cf80 _inconsistency 36 API calls 14195->14197 14198 7ff8be593e93 14195->14198 14199 7ff8be593e08 14196->14199 14200 7ff8be58cf80 _inconsistency 36 API calls 14196->14200 14197->14198 14201 7ff8be594f20 __SehTransFilter 36 API calls 14198->14201 14204 7ff8be594f20 14199->14204 14200->14199 14201->14202 14202->14184 14263 7ff8be593b70 14204->14263 14206 7ff8be58cf80 _inconsistency 36 API calls 14210 7ff8be594f55 __SehTransFilter _SetImageBase __SetState 14206->14210 14207 7ff8be595103 14208 7ff8be59514a __SetState 14207->14208 14209 7ff8be58cf80 _inconsistency 36 API calls 14207->14209 14208->14202 14209->14208 14210->14206 14210->14207 14212 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14211->14212 14213 7ff8be58e7bc 14212->14213 14214 7ff8be593b40 __StateFromControlPc 36 API calls 14213->14214 14215 7ff8be58e7d0 __SehTransFilter 14214->14215 14216 7ff8be594f20 __SehTransFilter 36 API calls 14215->14216 14217 7ff8be58e81e 14216->14217 14217->14202 14219 7ff8be593b40 __StateFromControlPc 36 API calls 14218->14219 14220 7ff8be5940ea 14219->14220 14221 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14220->14221 14222 7ff8be594110 14221->14222 14267 7ff8be593c70 14222->14267 14225 7ff8be594133 __SetState 14270 7ff8be593c00 14225->14270 14226 7ff8be594176 14227 7ff8be593c70 __GetUnwindTryBlock 37 API calls 14226->14227 14228 7ff8be594174 14227->14228 14230 7ff8be58cf80 _inconsistency 36 API calls 14228->14230 14244 7ff8be5941af _ValidateRead _SetThrowImageBase 14228->14244 14230->14244 14231 7ff8be5947d9 14232 7ff8be5947f3 14231->14232 14233 7ff8be594847 14231->14233 14240 7ff8be5947d7 14231->14240 14284 7ff8be594960 14232->14284 14237 7ff8be58cf50 terminate 35 API calls 14233->14237 14234 7ff8be5943f5 14242 7ff8be59466c __SehTransFilter 14234->14242 14279 7ff8be58ea30 14234->14279 14235 7ff8be594347 14235->14231 14235->14234 14237->14240 14239 7ff8be594235 14239->14202 14240->14239 14241 7ff8be58cf80 _inconsistency 36 API calls 14240->14241 14241->14239 14242->14240 14243 7ff8be595bb0 __SehTransFilter 36 API calls 14242->14243 14245 7ff8be594727 14243->14245 14244->14235 14244->14239 14247 7ff8be58cf80 _inconsistency 36 API calls 14244->14247 14250 7ff8be59428e 14244->14250 14245->14240 14246 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14245->14246 14248 7ff8be594767 14246->14248 14247->14250 14249 7ff8be58edc0 __SehTransFilter 9 API calls 14248->14249 14249->14240 14251 7ff8be58cf80 _inconsistency 36 API calls 14250->14251 14252 7ff8be5942fa 14250->14252 14251->14252 14252->14235 14254 7ff8be595bb0 __SehTransFilter 36 API calls 14252->14254 14253 7ff8be594450 __SehTransFilter 14253->14242 14255 7ff8be595180 __SehTransFilter 38 API calls 14253->14255 14256 7ff8be594340 __SehTransFilter 14254->14256 14255->14253 14256->14235 14257 7ff8be594393 14256->14257 14258 7ff8be59435a __SehTransFilter 14256->14258 14259 7ff8be58cf50 terminate 35 API calls 14257->14259 14273 7ff8be594870 14258->14273 14259->14235 14264 7ff8be593b9a 14263->14264 14265 7ff8be593ba9 14263->14265 14266 7ff8be593b40 __StateFromControlPc 36 API calls 14264->14266 14265->14210 14266->14265 14268 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14267->14268 14269 7ff8be593c9c 14268->14269 14269->14225 14269->14226 14271 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14270->14271 14272 7ff8be593c31 14271->14272 14272->14228 14294 7ff8be59d4e0 14273->14294 14276 7ff8be59d320 14277 7ff8be59d375 14276->14277 14278 7ff8be59d3ba RaiseException 14277->14278 14278->14235 14280 7ff8be593b40 __StateFromControlPc 36 API calls 14279->14280 14281 7ff8be58ea6f 14280->14281 14282 7ff8be58cf80 _inconsistency 36 API calls 14281->14282 14283 7ff8be58ea7a 14281->14283 14282->14283 14283->14253 14285 7ff8be594990 14284->14285 14291 7ff8be59498b 14284->14291 14290 7ff8be5949b2 __SehTransFilter 14285->14290 14297 7ff8be583d00 RtlEncodePointer 14285->14297 14286 7ff8be594a41 14288 7ff8be58ea30 __SehTransFilter 36 API calls 14286->14288 14287 7ff8be58cf80 _inconsistency 36 API calls 14287->14286 14292 7ff8be594a8e __SehTransFilter 14288->14292 14290->14286 14290->14287 14290->14291 14291->14240 14292->14291 14293 7ff8be595180 __SehTransFilter 38 API calls 14292->14293 14293->14291 14295 7ff8be59d660 std::exception::_Copy_str 17 API calls 14294->14295 14296 7ff8be59437d 14295->14296 14296->14276 14297->14290 14298 7ff8be5a0e40 14299 7ff8be5a0e50 14298->14299 14300 7ff8be5a0e5e 14298->14300 14299->14300 14301 7ff8be583e00 3 API calls 14299->14301 14301->14300 14302 7ff8be58443c 14303 7ff8be58444c 14302->14303 14306 7ff8be589360 LeaveCriticalSection 14303->14306 14305 7ff8be5848be 14306->14305 13054 7ff8be599939 13055 7ff8be599951 __doserrno 13054->13055 13056 7ff8be58bd70 _invalid_parameter 17 API calls 13055->13056 13057 7ff8be5999d7 13056->13057 13058 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13057->13058 13059 7ff8be59a9f5 13058->13059 14307 7ff8be593e3b 14308 7ff8be593ec7 14307->14308 14309 7ff8be58e790 __SehTransFilter 37 API calls 14308->14309 14310 7ff8be593ee4 14309->14310 12607 7ff8be588040 12608 7ff8be58805b GetModuleFileNameA 12607->12608 12609 7ff8be588056 12607->12609 12611 7ff8be588083 12608->12611 12610 7ff8be58aa40 __initmbctable 24 API calls 12609->12610 12610->12608 13071 7ff8be581140 13072 7ff8be58116a 13071->13072 13073 7ff8be58118c 13072->13073 13074 7ff8be58119a FileTimeToSystemTime 13072->13074 13076 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13073->13076 13074->13073 13075 7ff8be5811ae 13074->13075 13079 7ff8be581000 GetThreadLocale GetDateFormatA 13075->13079 13077 7ff8be5811d0 13076->13077 13080 7ff8be58105b 13079->13080 13081 7ff8be581062 GetThreadLocale GetTimeFormatA 13079->13081 13080->13073 13081->13080 13082 7ff8be59f53e 13083 7ff8be59f55c 13082->13083 13084 7ff8be59f74d 13083->13084 13085 7ff8be5a0170 23 API calls 13083->13085 13086 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13084->13086 13085->13084 13087 7ff8be59f7c5 13086->13087 14311 7ff8be587640 GetStartupInfoW 14319 7ff8be587676 _calloc_dbg 14311->14319 14312 7ff8be587689 14313 7ff8be587ce0 SetHandleCount 14313->14312 14314 7ff8be587b95 GetStdHandle 14316 7ff8be587bb9 14314->14316 14317 7ff8be587c7b 14314->14317 14315 7ff8be587ab9 14315->14313 14315->14314 14315->14317 14316->14317 14318 7ff8be587bc8 GetFileType 14316->14318 14317->14313 14318->14317 14320 7ff8be587beb InitializeCriticalSectionAndSpinCount 14318->14320 14319->14312 14319->14315 14322 7ff8be587a19 GetFileType 14319->14322 14323 7ff8be587a32 InitializeCriticalSectionAndSpinCount 14319->14323 14320->14312 14320->14317 14322->14315 14322->14323 14323->14312 14323->14315 13088 7ff8be5a0550 13089 7ff8be5a0575 13088->13089 13090 7ff8be5a055e 13088->13090 13090->13089 13091 7ff8be5a0568 CloseHandle 13090->13091 13091->13089 13092 7ff8be59c756 13093 7ff8be59c76b get_int64_arg get_int_arg 13092->13093 13095 7ff8be59b530 wctomb_s 19 API calls 13093->13095 13100 7ff8be59b99c 13093->13100 13094 7ff8be59cc93 13096 7ff8be58bd70 _invalid_parameter 17 API calls 13094->13096 13097 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 13094->13097 13095->13093 13096->13097 13099 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13097->13099 13098 7ff8be59bada 13102 7ff8be58bd70 _invalid_parameter 17 API calls 13098->13102 13101 7ff8be59cd90 13099->13101 13100->13094 13100->13098 13102->13097 14329 7ff8be58a057 14330 7ff8be58a061 14329->14330 14331 7ff8be58a234 14330->14331 14338 7ff8be58a08e __initmbctable 14330->14338 14333 7ff8be58a25d IsValidCodePage 14331->14333 14336 7ff8be58a22d __initmbctable 14331->14336 14332 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14334 7ff8be58a470 14332->14334 14335 7ff8be58a27b GetCPInfo 14333->14335 14333->14336 14335->14336 14340 7ff8be58a295 __initmbctable 14335->14340 14336->14332 14337 7ff8be58a5e0 __initmbctable 19 API calls 14337->14336 14338->14337 14339 7ff8be58a5e0 __initmbctable 19 API calls 14339->14336 14340->14339 13103 7ff8be585357 13106 7ff8be589360 LeaveCriticalSection 13103->13106 13105 7ff8be585361 13106->13105 14341 7ff8be58d04a 14342 7ff8be58d1d8 DecodePointer 14341->14342 14343 7ff8be58d1e8 14342->14343 14344 7ff8be587090 _exit 33 API calls 14343->14344 14345 7ff8be58d209 14343->14345 14349 7ff8be58d1f0 14343->14349 14344->14345 14347 7ff8be58d289 14345->14347 14350 7ff8be583d00 RtlEncodePointer 14345->14350 14347->14349 14351 7ff8be589360 LeaveCriticalSection 14347->14351 14350->14347 14351->14349 14352 7ff8be585854 14353 7ff8be58585b _calloc_dbg_impl 14352->14353 14354 7ff8be58c020 _free_base 2 API calls 14353->14354 14355 7ff8be5859d5 14354->14355 13130 7ff8be58cb4f 13136 7ff8be58cb5c 13130->13136 13131 7ff8be58cc94 13132 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13131->13132 13133 7ff8be58cf0f 13132->13133 13134 7ff8be58cbeb GetStdHandle 13134->13131 13137 7ff8be58cc07 std::exception::_Copy_str 13134->13137 13135 7ff8be58cc99 13135->13131 13159 7ff8be591640 13135->13159 13136->13131 13136->13134 13136->13135 13137->13131 13139 7ff8be58cc73 WriteFile 13137->13139 13139->13131 13140 7ff8be58cd10 13141 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13140->13141 13142 7ff8be58cd3d GetModuleFileNameW 13141->13142 13143 7ff8be58cd68 13142->13143 13147 7ff8be58cdb1 13142->13147 13144 7ff8be591640 17 API calls 13143->13144 13145 7ff8be58cd84 13144->13145 13146 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13145->13146 13146->13147 13148 7ff8be58ce5e 13147->13148 13169 7ff8be593380 13147->13169 13179 7ff8be592d80 13148->13179 13150 7ff8be58ce76 13152 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13150->13152 13153 7ff8be58cea3 13152->13153 13155 7ff8be592d80 17 API calls 13153->13155 13154 7ff8be58ce31 13156 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13154->13156 13157 7ff8be58ceb9 13155->13157 13156->13148 13158 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13157->13158 13158->13131 13160 7ff8be591661 13159->13160 13161 7ff8be591700 _calloc_dbg_impl 13160->13161 13162 7ff8be5916c2 13160->13162 13163 7ff8be591832 _calloc_dbg_impl 13161->13163 13165 7ff8be5917f4 13161->13165 13164 7ff8be58bd70 _invalid_parameter 17 API calls 13162->13164 13166 7ff8be5916f6 _calloc_dbg_impl 13163->13166 13168 7ff8be58bd70 _invalid_parameter 17 API calls 13163->13168 13164->13166 13167 7ff8be58bd70 _invalid_parameter 17 API calls 13165->13167 13166->13140 13167->13166 13168->13166 13170 7ff8be5933a6 13169->13170 13171 7ff8be59342f 13170->13171 13173 7ff8be59346d _calloc_dbg_impl 13170->13173 13176 7ff8be5933bc _calloc_dbg_impl 13170->13176 13172 7ff8be58bd70 _invalid_parameter 17 API calls 13171->13172 13172->13176 13174 7ff8be5935fb 13173->13174 13173->13176 13177 7ff8be593639 _calloc_dbg_impl 13173->13177 13175 7ff8be58bd70 _invalid_parameter 17 API calls 13174->13175 13175->13176 13176->13154 13177->13176 13178 7ff8be58bd70 _invalid_parameter 17 API calls 13177->13178 13178->13176 13180 7ff8be592da1 13179->13180 13181 7ff8be592e02 13180->13181 13183 7ff8be592e40 _calloc_dbg_impl 13180->13183 13184 7ff8be58bd70 _invalid_parameter 17 API calls 13181->13184 13182 7ff8be592f72 _calloc_dbg_impl 13187 7ff8be5930b5 13182->13187 13189 7ff8be5930f3 _calloc_dbg_impl 13182->13189 13183->13182 13185 7ff8be592f34 13183->13185 13188 7ff8be592e36 _calloc_dbg_impl 13184->13188 13186 7ff8be58bd70 _invalid_parameter 17 API calls 13185->13186 13186->13188 13190 7ff8be58bd70 _invalid_parameter 17 API calls 13187->13190 13188->13150 13189->13188 13191 7ff8be58bd70 _invalid_parameter 17 API calls 13189->13191 13190->13188 13191->13188 13192 7ff8be594920 13195 7ff8be59d530 13192->13195 13198 7ff8be59d580 13195->13198 13199 7ff8be59d59a std::exception::_Tidy 13198->13199 13200 7ff8be59493d 13198->13200 13199->13200 13202 7ff8be59d660 13199->13202 13203 7ff8be59d6bf 13202->13203 13204 7ff8be59d676 std::exception::_Copy_str malloc 13202->13204 13203->13200 13204->13203 13205 7ff8be58d490 std::exception::_Copy_str 17 API calls 13204->13205 13205->13203 12431 7ff8be58461b 12432 7ff8be584625 _calloc_dbg_impl 12431->12432 12435 7ff8be589360 LeaveCriticalSection 12432->12435 12434 7ff8be5848be 12435->12434 14360 7ff8be59e424 14361 7ff8be59e469 _CrtMemDumpAllObjectsSince 14360->14361 14362 7ff8be59e588 DecodePointer 14361->14362 14363 7ff8be59e5fd _CrtMemDumpAllObjectsSince 14362->14363 14364 7ff8be59e642 _CrtMemDumpAllObjectsSince 14363->14364 14365 7ff8be59e61b DecodePointer 14363->14365 14366 7ff8be59e666 DecodePointer 14364->14366 14368 7ff8be59e68d std::exception::_Copy_str 14364->14368 14365->14364 14366->14368 14367 7ff8be59eadf 14370 7ff8be59ef10 25 API calls 14367->14370 14368->14367 14369 7ff8be59eec0 25 API calls 14368->14369 14377 7ff8be59da75 14368->14377 14369->14367 14371 7ff8be59eafd 14370->14371 14372 7ff8be59eb33 14371->14372 14374 7ff8be59eec0 25 API calls 14371->14374 14373 7ff8be59ec29 14372->14373 14385 7ff8be59eb49 _CrtMemDumpAllObjectsSince 14372->14385 14375 7ff8be59ebda 14373->14375 14376 7ff8be59ef10 25 API calls 14373->14376 14374->14372 14375->14377 14379 7ff8be59eec0 25 API calls 14375->14379 14376->14375 14378 7ff8be59eca1 14377->14378 14381 7ff8be59dbb5 14377->14381 14380 7ff8be58bd70 _invalid_parameter 17 API calls 14378->14380 14382 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 14378->14382 14379->14377 14380->14382 14386 7ff8be58bd70 _invalid_parameter 17 API calls 14381->14386 14383 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14382->14383 14384 7ff8be59ed9e 14383->14384 14385->14375 14387 7ff8be59f000 wcsxfrm 2 API calls 14385->14387 14388 7ff8be59ee40 25 API calls 14385->14388 14386->14382 14387->14385 14388->14385 14389 7ff8be585a25 14390 7ff8be585a37 14389->14390 14391 7ff8be58bd70 _invalid_parameter 17 API calls 14390->14391 14392 7ff8be585aaf 14391->14392 14393 7ff8be58e830 14394 7ff8be58e857 14393->14394 14395 7ff8be593cc0 __SehTransFilter 39 API calls 14394->14395 14396 7ff8be58e8e3 14395->14396 13228 7ff8be5a1330 13241 7ff8be589360 LeaveCriticalSection 13228->13241 13230 7ff8be5a1343 13242 7ff8be589360 LeaveCriticalSection 13230->13242 13232 7ff8be5a1363 13243 7ff8be59af60 13232->13243 13236 7ff8be5a13b3 13249 7ff8be589360 LeaveCriticalSection 13236->13249 13238 7ff8be5a13d3 13250 7ff8be59aee0 13238->13250 13241->13230 13242->13232 13244 7ff8be59af74 13243->13244 13245 7ff8be59af98 LeaveCriticalSection 13243->13245 13256 7ff8be589360 LeaveCriticalSection 13244->13256 13247 7ff8be59af96 13245->13247 13248 7ff8be589360 LeaveCriticalSection 13247->13248 13248->13236 13249->13238 13251 7ff8be59af47 LeaveCriticalSection 13250->13251 13252 7ff8be59aef7 13250->13252 13254 7ff8be59af45 13251->13254 13252->13251 13253 7ff8be59af0b 13252->13253 13257 7ff8be589360 LeaveCriticalSection 13253->13257 13256->13247 13257->13254 14397 7ff8be59d830 14398 7ff8be59d8aa 14397->14398 14399 7ff8be59d926 14398->14399 14400 7ff8be59d97b 14398->14400 14401 7ff8be58bd70 _invalid_parameter 17 API calls 14399->14401 14402 7ff8be59d9ee 14400->14402 14408 7ff8be59da43 14400->14408 14404 7ff8be59d95a _LocaleUpdate::~_LocaleUpdate 14401->14404 14403 7ff8be58bd70 _invalid_parameter 17 API calls 14402->14403 14403->14404 14405 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14404->14405 14406 7ff8be59ed9e 14405->14406 14407 7ff8be59eca1 14407->14404 14409 7ff8be58bd70 _invalid_parameter 17 API calls 14407->14409 14408->14407 14410 7ff8be59dbb5 14408->14410 14409->14404 14411 7ff8be58bd70 _invalid_parameter 17 API calls 14410->14411 14411->14404 14421 7ff8be59c435 14422 7ff8be59c479 _CrtMemDumpAllObjectsSince 14421->14422 14423 7ff8be59c598 DecodePointer 14422->14423 14424 7ff8be59c60d _CrtMemDumpAllObjectsSince 14423->14424 14425 7ff8be59c62b DecodePointer 14424->14425 14426 7ff8be59c652 _CrtMemDumpAllObjectsSince 14424->14426 14425->14426 14427 7ff8be59c676 DecodePointer 14426->14427 14437 7ff8be59c69d std::exception::_Copy_str 14426->14437 14427->14437 14428 7ff8be59b99c 14429 7ff8be59cc93 14428->14429 14433 7ff8be59bada 14428->14433 14431 7ff8be58bd70 _invalid_parameter 17 API calls 14429->14431 14432 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 14429->14432 14430 7ff8be59b530 wctomb_s 19 API calls 14430->14437 14431->14432 14434 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14432->14434 14436 7ff8be58bd70 _invalid_parameter 17 API calls 14433->14436 14435 7ff8be59cd90 14434->14435 14436->14432 14437->14428 14437->14430 13267 7ff8be589328 13268 7ff8be589336 EnterCriticalSection 13267->13268 13269 7ff8be58932c 13267->13269 13269->13268 13270 7ff8be58b12b 13271 7ff8be58b14c 13270->13271 13272 7ff8be58b2e0 13271->13272 13274 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 13271->13274 13273 7ff8be58b33e 13272->13273 13275 7ff8be58d490 std::exception::_Copy_str 17 API calls 13272->13275 13286 7ff8be590cc0 13273->13286 13274->13272 13277 7ff8be58b311 13275->13277 13279 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13277->13279 13279->13273 13280 7ff8be58b37d 13284 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13280->13284 13281 7ff8be58cff0 terminate 34 API calls 13282 7ff8be58b373 13281->13282 13283 7ff8be587090 _exit 33 API calls 13282->13283 13283->13280 13285 7ff8be58b3a0 13284->13285 13304 7ff8be583d00 RtlEncodePointer 13286->13304 13288 7ff8be590cf6 13289 7ff8be590d23 LoadLibraryW 13288->13289 13290 7ff8be590e15 13288->13290 13291 7ff8be590d44 GetProcAddress 13289->13291 13292 7ff8be590d3d 13289->13292 13295 7ff8be590e39 DecodePointer DecodePointer 13290->13295 13303 7ff8be590e68 13290->13303 13291->13292 13293 7ff8be590d6a 7 API calls 13291->13293 13296 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13292->13296 13293->13290 13298 7ff8be590df3 GetProcAddress EncodePointer 13293->13298 13294 7ff8be590ec8 13297 7ff8be590f60 DecodePointer 13294->13297 13295->13303 13301 7ff8be58b358 13296->13301 13297->13292 13298->13290 13299 7ff8be590f0d 13299->13297 13302 7ff8be590f2f DecodePointer 13299->13302 13300 7ff8be590eed DecodePointer 13300->13299 13301->13280 13301->13281 13302->13294 13302->13297 13303->13294 13303->13299 13303->13300 13304->13288 12632 7ff8be583433 12633 7ff8be583437 12632->12633 12639 7ff8be583446 12632->12639 12640 7ff8be587d00 12633->12640 12642 7ff8be587d0e 12640->12642 12641 7ff8be58343c 12644 7ff8be583e00 12641->12644 12642->12641 12643 7ff8be587d87 DeleteCriticalSection 12642->12643 12643->12642 12645 7ff8be583e0d FlsFree 12644->12645 12646 7ff8be583e23 12644->12646 12645->12646 12650 7ff8be5890b0 12646->12650 12649 7ff8be5888d0 HeapDestroy 12649->12639 12654 7ff8be5890be 12650->12654 12651 7ff8be58914d 12653 7ff8be583441 12651->12653 12655 7ff8be589196 DeleteCriticalSection 12651->12655 12652 7ff8be5890fd DeleteCriticalSection 12652->12654 12653->12649 12654->12651 12654->12652 12655->12651 13305 7ff8be59ff2d 13306 7ff8be59ff37 13305->13306 13307 7ff8be5a0042 13306->13307 13308 7ff8be59ff47 13306->13308 13333 7ff8be589360 LeaveCriticalSection 13307->13333 13310 7ff8be5a003d 13308->13310 13320 7ff8be59ae90 13308->13320 13311 7ff8be5a004c 13313 7ff8be59ff97 13315 7ff8be59ffbb 13313->13315 13317 7ff8be59ffe1 13313->13317 13319 7ff8be59ffd0 13313->13319 13314 7ff8be59af60 _unlock_file2 2 API calls 13314->13310 13323 7ff8be59fd70 13315->13323 13318 7ff8be59fd70 _fflush_nolock 25 API calls 13317->13318 13317->13319 13318->13319 13319->13314 13321 7ff8be59aec8 EnterCriticalSection 13320->13321 13322 7ff8be59aea4 13320->13322 13321->13322 13322->13313 13324 7ff8be59fd81 13323->13324 13325 7ff8be59fd8a 13323->13325 13334 7ff8be59ff00 13324->13334 13349 7ff8be59fdf0 13325->13349 13328 7ff8be59fd94 13329 7ff8be59afb0 _fflush_nolock 17 API calls 13328->13329 13332 7ff8be59fd88 13328->13332 13330 7ff8be59fdba 13329->13330 13353 7ff8be5a07c0 13330->13353 13332->13319 13333->13311 13335 7ff8be59ff22 13334->13335 13336 7ff8be5a0042 13335->13336 13337 7ff8be59ff47 13335->13337 13369 7ff8be589360 LeaveCriticalSection 13336->13369 13339 7ff8be5a003d 13337->13339 13341 7ff8be59ae90 _lock_file2 EnterCriticalSection 13337->13341 13339->13332 13340 7ff8be5a004c 13340->13332 13342 7ff8be59ff97 13341->13342 13343 7ff8be59ffd0 13342->13343 13345 7ff8be59ffe1 13342->13345 13346 7ff8be59ffbb 13342->13346 13344 7ff8be59af60 _unlock_file2 2 API calls 13343->13344 13344->13339 13345->13343 13348 7ff8be59fd70 _fflush_nolock 25 API calls 13345->13348 13347 7ff8be59fd70 _fflush_nolock 25 API calls 13346->13347 13347->13343 13348->13343 13350 7ff8be59fe1f 13349->13350 13352 7ff8be59fe5d 13349->13352 13351 7ff8be59afb0 _fflush_nolock 17 API calls 13350->13351 13350->13352 13351->13352 13352->13328 13354 7ff8be5a07e8 13353->13354 13355 7ff8be5a07d3 13353->13355 13356 7ff8be5a0851 13354->13356 13358 7ff8be5a088f 13354->13358 13355->13332 13357 7ff8be58bd70 _invalid_parameter 17 API calls 13356->13357 13357->13355 13359 7ff8be5a0951 13358->13359 13360 7ff8be5a0913 13358->13360 13361 7ff8be59fae0 _fflush_nolock 3 API calls 13359->13361 13363 7ff8be58bd70 _invalid_parameter 17 API calls 13360->13363 13362 7ff8be5a095a 13361->13362 13364 7ff8be59f900 _fflush_nolock 17 API calls 13362->13364 13368 7ff8be5a09ab __doserrno 13362->13368 13363->13355 13365 7ff8be5a0992 FlushFileBuffers 13364->13365 13366 7ff8be5a099f GetLastError 13365->13366 13365->13368 13366->13368 13370 7ff8be59fbc0 LeaveCriticalSection 13368->13370 13369->13340 13370->13355 14438 7ff8be586c32 14439 7ff8be586c3c 14438->14439 14440 7ff8be586e25 _LocaleUpdate::~_LocaleUpdate 14439->14440 14441 7ff8be586c7a _CrtMemDumpAllObjectsSince 14439->14441 14442 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14440->14442 14444 7ff8be58c260 _CrtMemDumpAllObjectsSince_stat 3 API calls 14441->14444 14445 7ff8be586ce0 _CrtMemDumpAllObjectsSince _CrtMemDumpAllObjectsSince_stat 14441->14445 14443 7ff8be586e89 14442->14443 14444->14445 14446 7ff8be58c0c0 _swprintf_p 17 API calls 14445->14446 14448 7ff8be586dc7 14446->14448 14447 7ff8be586e12 14448->14447 14449 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14448->14449 14449->14447 12664 7ff8be583d30 12682 7ff8be587540 12664->12682 12669 7ff8be583d4e FlsAlloc 12672 7ff8be583d6a 12669->12672 12674 7ff8be583d73 _calloc_dbg 12669->12674 12670 7ff8be583d42 12671 7ff8be583e00 3 API calls 12670->12671 12679 7ff8be583d47 12671->12679 12673 7ff8be583e00 3 API calls 12672->12673 12673->12679 12675 7ff8be583db9 12674->12675 12676 7ff8be583da4 FlsSetValue 12674->12676 12678 7ff8be583e00 3 API calls 12675->12678 12676->12675 12677 7ff8be583dc2 12676->12677 12691 7ff8be583e30 12677->12691 12678->12679 12697 7ff8be583d00 RtlEncodePointer 12682->12697 12684 7ff8be587549 _initp_misc_winsig 12698 7ff8be58cf20 EncodePointer 12684->12698 12686 7ff8be583d39 12687 7ff8be588fe0 12686->12687 12690 7ff8be588ff6 12687->12690 12688 7ff8be583d3e 12688->12669 12688->12670 12689 7ff8be589022 InitializeCriticalSectionAndSpinCount 12689->12688 12689->12690 12690->12688 12690->12689 12692 7ff8be583ead 12691->12692 12699 7ff8be589360 LeaveCriticalSection 12692->12699 12694 7ff8be583ec7 _updatetlocinfoEx_nolock 12700 7ff8be589360 LeaveCriticalSection 12694->12700 12696 7ff8be583dce GetCurrentThreadId 12696->12679 12697->12684 12698->12686 12699->12694 12700->12696 13371 7ff8be583130 13374 7ff8be583170 13371->13374 13375 7ff8be5831ac 13374->13375 13376 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13375->13376 13377 7ff8be583160 13376->13377 13382 7ff8be5858fd 13383 7ff8be585923 _calloc_dbg_impl 13382->13383 13386 7ff8be58c020 13383->13386 13385 7ff8be5859d5 13387 7ff8be58c039 _get_errno_from_oserr 13386->13387 13388 7ff8be58c03b HeapFree 13386->13388 13387->13385 13388->13387 13389 7ff8be58c05a GetLastError 13388->13389 13389->13387 14455 7ff8be596203 14457 7ff8be59616e _CrtMemDumpAllObjectsSince wcsxfrm 14455->14457 14456 7ff8be596238 MultiByteToWideChar 14458 7ff8be5961c8 _LocaleUpdate::~_LocaleUpdate 14456->14458 14457->14456 14457->14458 14459 7ff8be5853fb 14460 7ff8be58541d _realloc_dbg 14459->14460 14461 7ff8be586380 _CrtIsValidHeapPointer HeapValidate 14460->14461 14462 7ff8be585421 14460->14462 14464 7ff8be5854de _calloc_dbg_impl _realloc_dbg 14461->14464 14463 7ff8be58c020 _free_base 2 API calls 14463->14462 14464->14463 14465 7ff8be5a0204 14467 7ff8be5a023d 14465->14467 14466 7ff8be5a028d 14467->14466 14468 7ff8be5a0326 14467->14468 14469 7ff8be59ab10 17 API calls 14467->14469 14468->14466 14470 7ff8be599290 23 API calls 14468->14470 14469->14468 14470->14466 13410 7ff8be59e2fc 13411 7ff8be59e309 get_int64_arg _get_printf_count_output 13410->13411 13412 7ff8be59e3e1 13411->13412 13413 7ff8be59e38c 13411->13413 13414 7ff8be59eadf 13412->13414 13415 7ff8be59eec0 25 API calls 13412->13415 13428 7ff8be59da75 13412->13428 13416 7ff8be58bd70 _invalid_parameter 17 API calls 13413->13416 13417 7ff8be59ef10 25 API calls 13414->13417 13415->13414 13422 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 13416->13422 13418 7ff8be59eafd 13417->13418 13419 7ff8be59eb33 13418->13419 13421 7ff8be59eec0 25 API calls 13418->13421 13420 7ff8be59ec29 13419->13420 13434 7ff8be59eb49 _CrtMemDumpAllObjectsSince 13419->13434 13423 7ff8be59ebda 13420->13423 13424 7ff8be59ef10 25 API calls 13420->13424 13421->13419 13425 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13422->13425 13423->13428 13429 7ff8be59eec0 25 API calls 13423->13429 13424->13423 13427 7ff8be59ed9e 13425->13427 13426 7ff8be59eca1 13426->13422 13430 7ff8be58bd70 _invalid_parameter 17 API calls 13426->13430 13428->13426 13431 7ff8be59dbb5 13428->13431 13429->13428 13430->13422 13432 7ff8be58bd70 _invalid_parameter 17 API calls 13431->13432 13432->13422 13433 7ff8be59f000 wcsxfrm 2 API calls 13433->13434 13434->13423 13434->13433 13435 7ff8be59ee40 25 API calls 13434->13435 13435->13434 14476 7ff8be592c10 14477 7ff8be592c53 14476->14477 14478 7ff8be592c24 _updatetlocinfoEx_nolock 14476->14478 14480 7ff8be589360 LeaveCriticalSection 14478->14480 14480->14477 14481 7ff8be59d410 14486 7ff8be59d3e0 14481->14486 14484 7ff8be59d43c 14493 7ff8be5a0070 14486->14493 14489 7ff8be59d710 14490 7ff8be59d721 14489->14490 14491 7ff8be59d726 14489->14491 14490->14484 14498 7ff8be589360 LeaveCriticalSection 14491->14498 14494 7ff8be5a0083 _free_nolock 14493->14494 14497 7ff8be589360 LeaveCriticalSection 14494->14497 14496 7ff8be59d402 14496->14484 14496->14489 14497->14496 14498->14490 14499 7ff8be58ae14 14500 7ff8be58b390 14499->14500 14501 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14500->14501 14502 7ff8be58b3a0 14501->14502 14503 7ff8be590215 14504 7ff8be590231 14503->14504 14510 7ff8be590302 14503->14510 14574 7ff8be598c80 14504->14574 14507 7ff8be590489 14509 7ff8be592d80 17 API calls 14507->14509 14508 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14512 7ff8be59027e OutputDebugStringW 14508->14512 14513 7ff8be5904a3 14509->14513 14511 7ff8be59040d 14510->14511 14581 7ff8be598c30 14510->14581 14511->14507 14514 7ff8be591640 17 API calls 14511->14514 14515 7ff8be590296 OutputDebugStringW OutputDebugStringW OutputDebugStringW OutputDebugStringW 14512->14515 14516 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14513->14516 14517 7ff8be59045c 14514->14517 14526 7ff8be5902f2 14515->14526 14519 7ff8be5904d0 14516->14519 14521 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14517->14521 14522 7ff8be59053d 14519->14522 14523 7ff8be592d80 17 API calls 14519->14523 14528 7ff8be590583 14519->14528 14521->14507 14524 7ff8be592d80 17 API calls 14522->14524 14529 7ff8be590510 14523->14529 14525 7ff8be590556 14524->14525 14530 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14525->14530 14531 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14526->14531 14527 7ff8be590357 14532 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14527->14532 14533 7ff8be5903af 14527->14533 14584 7ff8be591590 14528->14584 14534 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14529->14534 14530->14528 14535 7ff8be590cae 14531->14535 14532->14533 14533->14511 14536 7ff8be591640 17 API calls 14533->14536 14534->14522 14538 7ff8be5903e0 14536->14538 14539 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14538->14539 14539->14511 14540 7ff8be5905fa 14541 7ff8be590652 14540->14541 14542 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14540->14542 14543 7ff8be591640 17 API calls 14541->14543 14546 7ff8be5906b0 14541->14546 14542->14541 14544 7ff8be590683 14543->14544 14545 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14544->14545 14545->14546 14547 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14546->14547 14548 7ff8be590769 14547->14548 14549 7ff8be58d490 std::exception::_Copy_str 17 API calls 14548->14549 14562 7ff8be5907bd 14548->14562 14550 7ff8be590790 14549->14550 14551 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14550->14551 14551->14562 14552 7ff8be590905 14552->14526 14553 7ff8be590a26 14552->14553 14557 7ff8be5909a4 GetFileType 14552->14557 14554 7ff8be590ba5 14553->14554 14555 7ff8be590b97 OutputDebugStringW 14553->14555 14554->14526 14559 7ff8be590c23 14554->14559 14561 7ff8be598c80 _itow_s 17 API calls 14554->14561 14555->14554 14558 7ff8be5909d0 14557->14558 14564 7ff8be5909ce 14557->14564 14560 7ff8be5909dd WriteConsoleW 14558->14560 14588 7ff8be58b470 14559->14588 14560->14553 14563 7ff8be590a2b GetLastError 14560->14563 14565 7ff8be590bf6 14561->14565 14562->14552 14587 7ff8be589360 LeaveCriticalSection 14562->14587 14563->14553 14563->14564 14566 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14564->14566 14567 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14565->14567 14569 7ff8be590ab5 14566->14569 14567->14559 14570 7ff8be590b26 WriteFile 14569->14570 14572 7ff8be590ad0 14569->14572 14570->14553 14573 7ff8be590add WriteFile 14572->14573 14573->14553 14575 7ff8be598cd3 14574->14575 14576 7ff8be598ca6 14574->14576 14578 7ff8be598d00 _itow_s 17 API calls 14575->14578 14576->14575 14577 7ff8be598cad 14576->14577 14614 7ff8be598d00 14577->14614 14580 7ff8be590251 14578->14580 14580->14508 14630 7ff8be5986b0 14581->14630 14583 7ff8be598c74 14583->14527 14585 7ff8be5986b0 _wcsftime_l 17 API calls 14584->14585 14586 7ff8be5915de 14585->14586 14586->14540 14587->14552 14589 7ff8be58b48d 14588->14589 14590 7ff8be58b4ce GetModuleFileNameW 14589->14590 14610 7ff8be58b4c4 14589->14610 14591 7ff8be58b4f2 14590->14591 14596 7ff8be58b538 14590->14596 14592 7ff8be591640 17 API calls 14591->14592 14595 7ff8be58b50b 14592->14595 14593 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14594 7ff8be58ba58 14593->14594 14594->14526 14597 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14595->14597 14598 7ff8be590fd0 17 API calls 14596->14598 14601 7ff8be58b5f2 14596->14601 14597->14596 14599 7ff8be58b5c5 14598->14599 14600 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14599->14600 14600->14601 14602 7ff8be591590 _snwprintf_s 17 API calls 14601->14602 14603 7ff8be58b940 14602->14603 14604 7ff8be58b998 14603->14604 14605 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 14603->14605 14606 7ff8be591640 17 API calls 14604->14606 14609 7ff8be58b9f6 14604->14609 14605->14604 14607 7ff8be58b9c9 14606->14607 14608 7ff8be587ff0 _invoke_watson_if_error 16 API calls 14607->14608 14608->14609 14609->14610 14611 7ff8be58cff0 terminate 34 API calls 14609->14611 14610->14593 14612 7ff8be58ba2b 14611->14612 14613 7ff8be587090 _exit 33 API calls 14612->14613 14613->14610 14615 7ff8be598d25 14614->14615 14616 7ff8be598d7b 14615->14616 14617 7ff8be598db9 14615->14617 14618 7ff8be58bd70 _invalid_parameter 17 API calls 14616->14618 14619 7ff8be598e1a 14617->14619 14623 7ff8be598e58 _calloc_dbg_impl 14617->14623 14627 7ff8be598daf 14618->14627 14620 7ff8be58bd70 _invalid_parameter 17 API calls 14619->14620 14620->14627 14621 7ff8be598f9b 14625 7ff8be59900e 14621->14625 14628 7ff8be59904c 14621->14628 14622 7ff8be598f5d 14624 7ff8be58bd70 _invalid_parameter 17 API calls 14622->14624 14623->14621 14623->14622 14624->14627 14626 7ff8be58bd70 _invalid_parameter 17 API calls 14625->14626 14626->14627 14627->14580 14628->14627 14629 7ff8be58bd70 _invalid_parameter 17 API calls 14628->14629 14629->14627 14631 7ff8be5986e6 14630->14631 14632 7ff8be59873c 14631->14632 14634 7ff8be59877a 14631->14634 14633 7ff8be58bd70 _invalid_parameter 17 API calls 14632->14633 14642 7ff8be598770 _calloc_dbg_impl 14633->14642 14635 7ff8be59884c 14634->14635 14636 7ff8be59880e 14634->14636 14634->14642 14637 7ff8be598992 14635->14637 14638 7ff8be598862 14635->14638 14639 7ff8be58bd70 _invalid_parameter 17 API calls 14636->14639 14641 7ff8be598350 _wcsftime_l 17 API calls 14637->14641 14645 7ff8be598350 14638->14645 14639->14642 14643 7ff8be5988b1 _calloc_dbg_impl 14641->14643 14642->14583 14643->14642 14644 7ff8be58bd70 _invalid_parameter 17 API calls 14643->14644 14644->14642 14647 7ff8be59839b 14645->14647 14646 7ff8be5983f1 14648 7ff8be58bd70 _invalid_parameter 17 API calls 14646->14648 14647->14646 14649 7ff8be59842f 14647->14649 14651 7ff8be598425 14648->14651 14650 7ff8be58bd70 _invalid_parameter 17 API calls 14649->14650 14649->14651 14650->14651 14651->14643 13445 7ff8be583909 13446 7ff8be583913 __SehTransFilter 13445->13446 13447 7ff8be583a71 RtlUnwindEx 13446->13447 13448 7ff8be5839db __SehTransFilter 13446->13448 13447->13448 14652 7ff8be583409 14653 7ff8be583e00 3 API calls 14652->14653 14654 7ff8be58340e 14653->14654 14657 7ff8be5888d0 HeapDestroy 14654->14657 14656 7ff8be583413 14657->14656 14658 7ff8be587816 14659 7ff8be587826 _calloc_dbg 14658->14659 14661 7ff8be587ab9 14659->14661 14662 7ff8be587a19 GetFileType 14659->14662 14663 7ff8be587a32 InitializeCriticalSectionAndSpinCount 14659->14663 14660 7ff8be587ce0 SetHandleCount 14666 7ff8be587aaf 14660->14666 14661->14660 14664 7ff8be587b95 GetStdHandle 14661->14664 14665 7ff8be587c7b 14661->14665 14662->14661 14662->14663 14663->14661 14663->14666 14664->14665 14667 7ff8be587bb9 14664->14667 14665->14660 14667->14665 14668 7ff8be587bc8 GetFileType 14667->14668 14668->14665 14669 7ff8be587beb InitializeCriticalSectionAndSpinCount 14668->14669 14669->14665 14669->14666 13449 7ff8be59c30d 13450 7ff8be59c31a get_int64_arg _get_printf_count_output 13449->13450 13451 7ff8be59c39d 13450->13451 13452 7ff8be59c3f2 13450->13452 13453 7ff8be58bd70 _invalid_parameter 17 API calls 13451->13453 13456 7ff8be59b99c 13452->13456 13458 7ff8be59b530 wctomb_s 19 API calls 13452->13458 13462 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 13453->13462 13454 7ff8be59cc93 13459 7ff8be58bd70 _invalid_parameter 17 API calls 13454->13459 13454->13462 13455 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13457 7ff8be59cd90 13455->13457 13456->13454 13460 7ff8be59bada 13456->13460 13458->13452 13459->13462 13461 7ff8be58bd70 _invalid_parameter 17 API calls 13460->13461 13461->13462 13462->13455 13490 7ff8be595de0 13491 7ff8be583170 __GSHandlerCheck 8 API calls 13490->13491 13493 7ff8be595e34 13491->13493 13492 7ff8be595e86 13493->13492 13495 7ff8be583870 13493->13495 13496 7ff8be5839db __SehTransFilter 13495->13496 13497 7ff8be5838de __SehTransFilter 13495->13497 13496->13492 13497->13496 13498 7ff8be583a71 RtlUnwindEx 13497->13498 13498->13496 14671 7ff8be5948e0 14672 7ff8be5948f7 std::bad_exception::~bad_exception 14671->14672 14673 7ff8be59490c 14672->14673 14674 7ff8be59d710 _Ref_count LeaveCriticalSection 14672->14674 14674->14673 13502 7ff8be59ade0 13507 7ff8be59fee0 13502->13507 13505 7ff8be59adf9 13508 7ff8be59ff00 _fflush_nolock 25 API calls 13507->13508 13509 7ff8be59ade9 13508->13509 13509->13505 13510 7ff8be59fc70 13509->13510 13516 7ff8be59fc86 13510->13516 13511 7ff8be59fd59 13528 7ff8be589360 LeaveCriticalSection 13511->13528 13513 7ff8be59fd63 13513->13505 13514 7ff8be59fd09 DeleteCriticalSection 13514->13516 13516->13511 13516->13514 13517 7ff8be5a0580 13516->13517 13518 7ff8be5a0599 13517->13518 13519 7ff8be5a062a 13518->13519 13520 7ff8be5a05ef 13518->13520 13521 7ff8be5a0623 13519->13521 13529 7ff8be59ae10 13519->13529 13523 7ff8be58bd70 _invalid_parameter 17 API calls 13520->13523 13521->13516 13523->13521 13524 7ff8be5a0651 13533 7ff8be5a0680 13524->13533 13526 7ff8be5a065c 13527 7ff8be59aee0 _mtinitlocknum$fin$0 2 API calls 13526->13527 13527->13521 13528->13513 13530 7ff8be59ae77 EnterCriticalSection 13529->13530 13531 7ff8be59ae27 13529->13531 13532 7ff8be59ae3b 13530->13532 13531->13530 13531->13532 13532->13524 13536 7ff8be5a0699 13533->13536 13534 7ff8be5a072d 13537 7ff8be5a0723 13534->13537 13538 7ff8be59fdf0 _fflush_nolock 17 API calls 13534->13538 13535 7ff8be5a06ef 13539 7ff8be58bd70 _invalid_parameter 17 API calls 13535->13539 13536->13534 13536->13535 13537->13526 13540 7ff8be5a0752 13538->13540 13539->13537 13541 7ff8be59afb0 _fflush_nolock 17 API calls 13540->13541 13542 7ff8be5a076a 13541->13542 13544 7ff8be5a0a20 13542->13544 13545 7ff8be5a0a33 __doserrno 13544->13545 13546 7ff8be5a0a53 13544->13546 13545->13537 13547 7ff8be5a0b05 13546->13547 13548 7ff8be5a0abc __doserrno 13546->13548 13549 7ff8be5a0bd2 13547->13549 13553 7ff8be5a0b89 __doserrno 13547->13553 13550 7ff8be58bd70 _invalid_parameter 17 API calls 13548->13550 13551 7ff8be59fae0 _fflush_nolock 3 API calls 13549->13551 13550->13545 13552 7ff8be5a0bdb 13551->13552 13556 7ff8be5a0c13 13552->13556 13558 7ff8be5a0c80 13552->13558 13555 7ff8be58bd70 _invalid_parameter 17 API calls 13553->13555 13555->13545 13571 7ff8be59fbc0 LeaveCriticalSection 13556->13571 13559 7ff8be59f900 _fflush_nolock 17 API calls 13558->13559 13562 7ff8be5a0c91 13559->13562 13560 7ff8be5a0d05 13572 7ff8be59f7d0 13560->13572 13562->13560 13563 7ff8be59f900 _fflush_nolock 17 API calls 13562->13563 13570 7ff8be5a0ce5 13562->13570 13566 7ff8be5a0cd6 13563->13566 13564 7ff8be59f900 _fflush_nolock 17 API calls 13567 7ff8be5a0cf8 CloseHandle 13564->13567 13565 7ff8be5a0d22 _dosmaperr 13565->13556 13569 7ff8be59f900 _fflush_nolock 17 API calls 13566->13569 13567->13560 13568 7ff8be5a0d0f GetLastError 13567->13568 13568->13560 13569->13570 13570->13560 13570->13564 13571->13545 13573 7ff8be59f7e3 13572->13573 13574 7ff8be59f878 __doserrno 13572->13574 13573->13574 13575 7ff8be59f87a SetStdHandle 13573->13575 13576 7ff8be59f86a 13573->13576 13574->13565 13575->13574 13577 7ff8be59f871 13576->13577 13578 7ff8be59f889 SetStdHandle 13576->13578 13577->13574 13579 7ff8be59f898 SetStdHandle 13577->13579 13578->13574 13579->13574 14675 7ff8be5914e1 14676 7ff8be591520 DecodePointer 14675->14676 14677 7ff8be5914ef DecodePointer 14675->14677 14678 7ff8be591540 14676->14678 14677->14676 14679 7ff8be59150f 14677->14679 14680 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14678->14680 14679->14676 14681 7ff8be59157a 14680->14681 14682 7ff8be5912e3 LoadLibraryW 14683 7ff8be591304 GetProcAddress 14682->14683 14691 7ff8be5912fd 14682->14691 14684 7ff8be59132a 7 API calls 14683->14684 14683->14691 14686 7ff8be5913b3 GetProcAddress EncodePointer 14684->14686 14687 7ff8be5913d5 14684->14687 14685 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14688 7ff8be59157a 14685->14688 14686->14687 14689 7ff8be5913f9 DecodePointer DecodePointer 14687->14689 14692 7ff8be591428 DecodePointer 14687->14692 14689->14692 14691->14685 14692->14691 14693 7ff8be5944e5 14697 7ff8be59445a __SehTransFilter 14693->14697 14694 7ff8be5947d7 14695 7ff8be59485b 14694->14695 14696 7ff8be58cf80 _inconsistency 36 API calls 14694->14696 14696->14695 14698 7ff8be59466c __SehTransFilter 14697->14698 14700 7ff8be595180 __SehTransFilter 38 API calls 14697->14700 14698->14694 14699 7ff8be595bb0 __SehTransFilter 36 API calls 14698->14699 14701 7ff8be594727 14699->14701 14700->14697 14701->14694 14702 7ff8be58e500 __GetUnwindTryBlock 37 API calls 14701->14702 14703 7ff8be594767 14702->14703 14704 7ff8be58edc0 __SehTransFilter 9 API calls 14703->14704 14704->14694 14709 7ff8be5866da 14710 7ff8be586725 14709->14710 14712 7ff8be586745 14709->14712 14710->14712 14715 7ff8be589a70 14710->14715 14713 7ff8be589b10 __updatetmbcinfo LeaveCriticalSection 14712->14713 14714 7ff8be58677f 14712->14714 14713->14714 14717 7ff8be589a79 _updatetlocinfoEx_nolock 14715->14717 14716 7ff8be589ad8 14716->14712 14717->14716 14719 7ff8be589360 LeaveCriticalSection 14717->14719 14719->14716 14720 7ff8be585ad9 14721 7ff8be585add 14720->14721 14722 7ff8be586380 _CrtIsValidHeapPointer HeapValidate 14721->14722 14723 7ff8be585b3a 14722->14723 14726 7ff8be589360 LeaveCriticalSection 14723->14726 14725 7ff8be585c14 14726->14725 14727 7ff8be5870e6 14728 7ff8be587090 _exit 33 API calls 14727->14728 14729 7ff8be5870f0 14728->14729 12449 7ff8be587ae3 12453 7ff8be587af3 12449->12453 12450 7ff8be587ce0 SetHandleCount 12451 7ff8be587c74 12450->12451 12452 7ff8be587b95 GetStdHandle 12454 7ff8be587bb9 12452->12454 12455 7ff8be587c7b 12452->12455 12453->12450 12453->12452 12453->12455 12454->12455 12456 7ff8be587bc8 GetFileType 12454->12456 12455->12450 12456->12455 12457 7ff8be587beb InitializeCriticalSectionAndSpinCount 12456->12457 12457->12451 12457->12455 12459 7ff8be5835e1 12462 7ff8be5835f1 12459->12462 12464 7ff8be5835ea 12459->12464 12462->12464 12465 7ff8be5812b0 12462->12465 12463 7ff8be5812b0 14 API calls 12463->12464 12466 7ff8be5812de CoLoadLibrary 12465->12466 12474 7ff8be5830ca 12465->12474 12468 7ff8be582f0f MessageBoxA ExitProcess 12466->12468 12469 7ff8be582f2e VirtualAlloc RtlAllocateHeap 12466->12469 12471 7ff8be582f8c 12469->12471 12472 7ff8be582f73 _calloc_dbg_impl 12469->12472 12470 7ff8be5830ff 12470->12463 12470->12464 12471->12474 12473 7ff8be582f83 RtlDeleteBoundaryDescriptor 12472->12473 12473->12471 12475 7ff8be583280 12474->12475 12476 7ff8be583289 12475->12476 12477 7ff8be583294 12476->12477 12478 7ff8be583720 RtlCaptureContext RtlLookupFunctionEntry 12476->12478 12477->12470 12479 7ff8be5837a5 12478->12479 12480 7ff8be583764 RtlVirtualUnwind 12478->12480 12481 7ff8be5837c7 IsDebuggerPresent 12479->12481 12480->12481 12486 7ff8be588d90 12481->12486 12483 7ff8be583826 SetUnhandledExceptionFilter UnhandledExceptionFilter 12484 7ff8be58384e GetCurrentProcess TerminateProcess 12483->12484 12485 7ff8be583844 terminate 12483->12485 12484->12470 12485->12484 12486->12483 13612 7ff8be583fe1 13613 7ff8be583fea SetLastError 13612->13613 12487 7ff8be587de0 12488 7ff8be587ded 12487->12488 12492 7ff8be587df2 std::exception::_Copy_str _calloc_dbg 12487->12492 12494 7ff8be58aa40 12488->12494 12490 7ff8be587e0e 12492->12490 12498 7ff8be58d490 12492->12498 12508 7ff8be587ff0 12492->12508 12495 7ff8be58aa57 12494->12495 12496 7ff8be58aa4d 12494->12496 12495->12492 12512 7ff8be589c10 12496->12512 12499 7ff8be58d4b1 12498->12499 12500 7ff8be58d512 12499->12500 12502 7ff8be58d550 _calloc_dbg_impl 12499->12502 12591 7ff8be58bd70 DecodePointer 12500->12591 12503 7ff8be58d63e 12502->12503 12506 7ff8be58d67c _calloc_dbg_impl 12502->12506 12505 7ff8be58bd70 _invalid_parameter 17 API calls 12503->12505 12504 7ff8be58d546 _calloc_dbg_impl 12504->12492 12505->12504 12506->12504 12507 7ff8be58bd70 _invalid_parameter 17 API calls 12506->12507 12507->12504 12509 7ff8be58800e 12508->12509 12510 7ff8be588010 12508->12510 12509->12492 12511 7ff8be58be00 _invalid_parameter 16 API calls 12510->12511 12511->12509 12513 7ff8be589c2a 12512->12513 12522 7ff8be589b10 12513->12522 12515 7ff8be589c34 12526 7ff8be589f20 12515->12526 12517 7ff8be589ecd 12517->12495 12518 7ff8be589c51 12518->12517 12532 7ff8be58a000 12518->12532 12520 7ff8be589ce8 12520->12517 12547 7ff8be589360 LeaveCriticalSection 12520->12547 12525 7ff8be589b19 12522->12525 12524 7ff8be589bde 12524->12515 12525->12524 12548 7ff8be589360 LeaveCriticalSection 12525->12548 12527 7ff8be589f49 12526->12527 12528 7ff8be589f81 12527->12528 12529 7ff8be589f5b GetOEMCP 12527->12529 12530 7ff8be589f79 _CrtMemDumpAllObjectsSince _LocaleUpdate::~_LocaleUpdate 12528->12530 12531 7ff8be589f88 GetACP 12528->12531 12529->12530 12530->12518 12531->12530 12533 7ff8be589f20 __initmbctable 2 API calls 12532->12533 12535 7ff8be58a028 12533->12535 12534 7ff8be58a234 12538 7ff8be58a25d IsValidCodePage 12534->12538 12541 7ff8be58a039 __initmbctable 12534->12541 12535->12534 12535->12541 12542 7ff8be58a08e __initmbctable 12535->12542 12536 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12537 7ff8be58a470 12536->12537 12537->12520 12539 7ff8be58a27b GetCPInfo 12538->12539 12538->12541 12540 7ff8be58a444 12539->12540 12546 7ff8be58a295 __initmbctable 12539->12546 12540->12541 12541->12536 12543 7ff8be58a220 12542->12543 12544 7ff8be58a5e0 __initmbctable 19 API calls 12543->12544 12544->12541 12549 7ff8be58a5e0 GetCPInfo 12546->12549 12547->12517 12548->12524 12555 7ff8be58a61f 12549->12555 12560 7ff8be58a7dc 12549->12560 12550 7ff8be58a901 12551 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12550->12551 12552 7ff8be58aa30 12551->12552 12552->12541 12553 7ff8be58a80a 12553->12541 12561 7ff8be58f4d0 12555->12561 12556 7ff8be58a734 12565 7ff8be58ef00 12556->12565 12558 7ff8be58a788 12559 7ff8be58ef00 __initmbctable 7 API calls 12558->12559 12559->12560 12560->12550 12560->12553 12562 7ff8be58f4f9 _CrtMemDumpAllObjectsSince 12561->12562 12569 7ff8be58f570 12562->12569 12564 7ff8be58f550 _LocaleUpdate::~_LocaleUpdate 12564->12556 12566 7ff8be58ef2c _CrtMemDumpAllObjectsSince 12565->12566 12576 7ff8be58efb0 12566->12576 12568 7ff8be58ef8e _LocaleUpdate::~_LocaleUpdate 12568->12558 12570 7ff8be58f599 MultiByteToWideChar 12569->12570 12572 7ff8be58f604 _CrtMemDumpAllObjectsSince_stat 12570->12572 12573 7ff8be58f60b malloc _calloc_dbg_impl _MarkAllocaS 12570->12573 12572->12564 12573->12572 12574 7ff8be58f68b MultiByteToWideChar 12573->12574 12574->12572 12575 7ff8be58f6ca GetStringTypeW 12574->12575 12575->12572 12577 7ff8be58efd4 __initmbctable 12576->12577 12578 7ff8be58f068 MultiByteToWideChar 12577->12578 12579 7ff8be58f0a5 _CrtMemDumpAllObjectsSince_stat 12578->12579 12584 7ff8be58f0ac malloc _MarkAllocaS 12578->12584 12579->12568 12580 7ff8be58f122 MultiByteToWideChar 12580->12579 12581 7ff8be58f164 LCMapStringW 12580->12581 12581->12579 12582 7ff8be58f1a8 12581->12582 12583 7ff8be58f1b8 12582->12583 12590 7ff8be58f222 malloc _MarkAllocaS 12582->12590 12583->12579 12585 7ff8be58f1d9 LCMapStringW 12583->12585 12584->12579 12584->12580 12585->12579 12586 7ff8be58f2ac LCMapStringW 12586->12579 12587 7ff8be58f2ea 12586->12587 12588 7ff8be58f341 WideCharToMultiByte 12587->12588 12589 7ff8be58f2f4 WideCharToMultiByte 12587->12589 12588->12579 12589->12579 12590->12579 12590->12586 12592 7ff8be58bdd0 12591->12592 12593 7ff8be58bdac 12591->12593 12595 7ff8be58be00 12592->12595 12593->12504 12598 7ff8be58be50 12595->12598 12599 7ff8be58be81 terminate 12598->12599 12600 7ff8be58be8d RtlCaptureContext RtlLookupFunctionEntry 12598->12600 12599->12600 12601 7ff8be58bf64 12600->12601 12602 7ff8be58bf1c RtlVirtualUnwind 12600->12602 12603 7ff8be58bf84 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12601->12603 12602->12603 12604 7ff8be58bfde terminate 12603->12604 12605 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 12604->12605 12606 7ff8be58be2d GetCurrentProcess TerminateProcess 12605->12606 12606->12593 13614 7ff8be59bfde 13624 7ff8be59c00c 13614->13624 13615 7ff8be59b99c 13616 7ff8be59cc93 13615->13616 13620 7ff8be59bada 13615->13620 13618 7ff8be58bd70 _invalid_parameter 17 API calls 13616->13618 13619 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 13616->13619 13617 7ff8be59b530 wctomb_s 19 API calls 13617->13624 13618->13619 13621 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13619->13621 13623 7ff8be58bd70 _invalid_parameter 17 API calls 13620->13623 13622 7ff8be59cd90 13621->13622 13623->13619 13624->13615 13624->13617 13625 7ff8be58f7f1 13626 7ff8be58f80d 13625->13626 13645 7ff8be58f8de _wcsftime_l 13625->13645 13682 7ff8be596fb0 13626->13682 13628 7ff8be58fa70 13689 7ff8be5969c0 13628->13689 13631 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13634 7ff8be58f85a OutputDebugStringA 13631->13634 13632 7ff8be58fa8a 13635 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13632->13635 13633 7ff8be58f9f4 13633->13628 13636 7ff8be58d490 std::exception::_Copy_str 17 API calls 13633->13636 13637 7ff8be58f872 OutputDebugStringA OutputDebugStringA OutputDebugStringA OutputDebugStringA 13634->13637 13639 7ff8be58fab7 13635->13639 13640 7ff8be58fa43 13636->13640 13681 7ff8be58f8ce 13637->13681 13642 7ff8be58fb24 13639->13642 13643 7ff8be5969c0 17 API calls 13639->13643 13657 7ff8be58fb6a 13639->13657 13641 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13640->13641 13641->13628 13644 7ff8be5969c0 17 API calls 13642->13644 13646 7ff8be58faf7 13643->13646 13647 7ff8be58fb3d 13644->13647 13645->13633 13648 7ff8be58f996 13645->13648 13652 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 13645->13652 13649 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13646->13649 13650 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13647->13650 13648->13633 13653 7ff8be58d490 std::exception::_Copy_str 17 API calls 13648->13653 13649->13642 13650->13657 13651 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13654 7ff8be59011d 13651->13654 13652->13648 13655 7ff8be58f9c7 13653->13655 13656 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13655->13656 13656->13633 13658 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 13657->13658 13659 7ff8be58fc39 13657->13659 13658->13659 13660 7ff8be58fc97 13659->13660 13661 7ff8be58d490 std::exception::_Copy_str 17 API calls 13659->13661 13702 7ff8be596970 13660->13702 13663 7ff8be58fc6a 13661->13663 13665 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13663->13665 13665->13660 13666 7ff8be586ea0 _invoke_watson_if_oneof 16 API calls 13667 7ff8be58fd6e 13666->13667 13668 7ff8be591640 17 API calls 13667->13668 13679 7ff8be58fdbb 13667->13679 13669 7ff8be58fd8e 13668->13669 13670 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13669->13670 13670->13679 13671 7ff8be58ffef 13673 7ff8be590016 13671->13673 13674 7ff8be590008 OutputDebugStringA 13671->13674 13677 7ff8be596fb0 _itow_s 17 API calls 13673->13677 13673->13681 13674->13673 13675 7ff8be58ff03 std::exception::_Copy_str 13675->13671 13676 7ff8be58ffaa WriteFile 13675->13676 13675->13681 13676->13671 13678 7ff8be590065 13677->13678 13680 7ff8be587ff0 _invoke_watson_if_error 16 API calls 13678->13680 13679->13675 13705 7ff8be589360 LeaveCriticalSection 13679->13705 13680->13681 13681->13651 13683 7ff8be597003 13682->13683 13684 7ff8be596fd6 13682->13684 13686 7ff8be597030 _itow_s 17 API calls 13683->13686 13684->13683 13685 7ff8be596fdd 13684->13685 13706 7ff8be597030 13685->13706 13688 7ff8be58f82d 13686->13688 13688->13631 13690 7ff8be5969e1 13689->13690 13691 7ff8be596a42 13690->13691 13693 7ff8be596a80 _calloc_dbg_impl 13690->13693 13692 7ff8be58bd70 _invalid_parameter 17 API calls 13691->13692 13700 7ff8be596a76 _calloc_dbg_impl 13692->13700 13694 7ff8be596b6e 13693->13694 13696 7ff8be596bac _calloc_dbg_impl 13693->13696 13698 7ff8be58bd70 _invalid_parameter 17 API calls 13694->13698 13695 7ff8be596d26 _calloc_dbg_impl 13695->13700 13701 7ff8be58bd70 _invalid_parameter 17 API calls 13695->13701 13696->13695 13697 7ff8be596ce8 13696->13697 13699 7ff8be58bd70 _invalid_parameter 17 API calls 13697->13699 13698->13700 13699->13700 13700->13632 13701->13700 13722 7ff8be5963e0 13702->13722 13704 7ff8be58fd20 13704->13666 13705->13675 13707 7ff8be597055 13706->13707 13708 7ff8be5970ab 13707->13708 13709 7ff8be5970e9 13707->13709 13710 7ff8be58bd70 _invalid_parameter 17 API calls 13708->13710 13711 7ff8be59714a 13709->13711 13713 7ff8be597188 _calloc_dbg_impl 13709->13713 13719 7ff8be5970df 13710->13719 13712 7ff8be58bd70 _invalid_parameter 17 API calls 13711->13712 13712->13719 13714 7ff8be597287 13713->13714 13716 7ff8be5972c5 13713->13716 13715 7ff8be58bd70 _invalid_parameter 17 API calls 13714->13715 13715->13719 13717 7ff8be597338 13716->13717 13720 7ff8be597376 13716->13720 13718 7ff8be58bd70 _invalid_parameter 17 API calls 13717->13718 13718->13719 13719->13688 13720->13719 13721 7ff8be58bd70 _invalid_parameter 17 API calls 13720->13721 13721->13719 13723 7ff8be59640e 13722->13723 13724 7ff8be59648e 13723->13724 13726 7ff8be5964cc _calloc_dbg_impl 13723->13726 13725 7ff8be58bd70 _invalid_parameter 17 API calls 13724->13725 13733 7ff8be5964c2 _calloc_dbg_impl _LocaleUpdate::~_LocaleUpdate 13725->13733 13727 7ff8be59668e _CrtMemDumpAllObjectsSince 13726->13727 13728 7ff8be59663f 13726->13728 13734 7ff8be595ea0 13727->13734 13729 7ff8be58bd70 _invalid_parameter 17 API calls 13728->13729 13729->13733 13731 7ff8be5966b5 _calloc_dbg_impl 13732 7ff8be58bd70 _invalid_parameter 17 API calls 13731->13732 13731->13733 13732->13733 13733->13704 13735 7ff8be595ecf 13734->13735 13736 7ff8be595fae 13735->13736 13737 7ff8be595f6e 13735->13737 13746 7ff8be595eda std::exception::_Copy_str _LocaleUpdate::~_LocaleUpdate 13735->13746 13738 7ff8be595fcf _CrtMemDumpAllObjectsSince 13736->13738 13740 7ff8be5962e1 _CrtMemDumpAllObjectsSince 13736->13740 13739 7ff8be58bd70 _invalid_parameter 17 API calls 13737->13739 13741 7ff8be5960a1 MultiByteToWideChar 13738->13741 13738->13746 13739->13746 13742 7ff8be59632f MultiByteToWideChar 13740->13742 13740->13746 13743 7ff8be59610e GetLastError 13741->13743 13741->13746 13742->13746 13745 7ff8be596154 _CrtMemDumpAllObjectsSince wcsxfrm 13743->13745 13743->13746 13744 7ff8be596238 MultiByteToWideChar 13744->13746 13745->13744 13745->13746 13746->13731 14761 7ff8be5864eb 14762 7ff8be5864f8 14761->14762 14763 7ff8be586504 14762->14763 14766 7ff8be589360 LeaveCriticalSection 14762->14766 14765 7ff8be586655 14766->14765 13751 7ff8be58a7e9 13753 7ff8be58a7f9 13751->13753 13752 7ff8be58a80a 13753->13752 13754 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13753->13754 13755 7ff8be58aa30 13754->13755 13756 7ff8be58c7e9 13757 7ff8be58c90c EncodePointer EncodePointer 13756->13757 13758 7ff8be58c80d 13756->13758 13761 7ff8be58c8ca 13757->13761 13759 7ff8be58c872 13758->13759 13765 7ff8be584a00 13758->13765 13759->13761 13762 7ff8be584a00 _realloc_dbg 30 API calls 13759->13762 13763 7ff8be58c8ce EncodePointer 13759->13763 13764 7ff8be58c8bd 13762->13764 13763->13757 13764->13761 13764->13763 13766 7ff8be584a22 13765->13766 13771 7ff8be584a70 13766->13771 13768 7ff8be584a4c 13782 7ff8be589360 LeaveCriticalSection 13768->13782 13770 7ff8be584a5b 13770->13759 13773 7ff8be584ad4 _realloc_dbg 13771->13773 13781 7ff8be584aae _calloc_dbg_impl 13771->13781 13773->13781 13783 7ff8be586380 13773->13783 13774 7ff8be584e2c 13775 7ff8be584f64 13774->13775 13776 7ff8be584f90 13774->13776 13774->13781 13787 7ff8be58bc30 13775->13787 13802 7ff8be58ba60 13776->13802 13779 7ff8be584fa6 13780 7ff8be584fba HeapSize 13779->13780 13779->13781 13780->13781 13781->13768 13782->13770 13784 7ff8be586391 13783->13784 13785 7ff8be586395 _CrtIsValidPointer 13783->13785 13784->13774 13785->13784 13786 7ff8be5863b6 HeapValidate 13785->13786 13786->13784 13788 7ff8be58bc50 13787->13788 13789 7ff8be58bc5f 13787->13789 13813 7ff8be58abf0 13788->13813 13791 7ff8be58bc67 13789->13791 13796 7ff8be58bc78 13789->13796 13792 7ff8be58c020 _free_base 2 API calls 13791->13792 13799 7ff8be58bc5a _get_errno_from_oserr 13792->13799 13793 7ff8be58bcba 13795 7ff8be58abb0 _callnewh DecodePointer 13793->13795 13794 7ff8be58bc9a HeapReAlloc 13794->13796 13795->13799 13796->13793 13796->13794 13797 7ff8be58bce4 13796->13797 13800 7ff8be58abb0 _callnewh DecodePointer 13796->13800 13801 7ff8be58bd1f GetLastError 13796->13801 13798 7ff8be58bcee GetLastError 13797->13798 13797->13799 13798->13799 13799->13781 13800->13796 13801->13799 13803 7ff8be58ba76 13802->13803 13804 7ff8be58bb07 13803->13804 13805 7ff8be58bacc 13803->13805 13806 7ff8be58bb00 _get_errno_from_oserr 13804->13806 13807 7ff8be58bb32 HeapSize HeapReAlloc 13804->13807 13808 7ff8be58bd70 _invalid_parameter 17 API calls 13805->13808 13806->13779 13807->13806 13810 7ff8be58bb74 13807->13810 13808->13806 13809 7ff8be58bba0 GetLastError 13809->13806 13810->13809 13819 7ff8be58bbd0 HeapQueryInformation 13810->13819 13814 7ff8be58ac4d 13813->13814 13816 7ff8be58ac0a 13813->13816 13815 7ff8be58abb0 _callnewh DecodePointer 13814->13815 13818 7ff8be58ac21 13815->13818 13817 7ff8be58abb0 _callnewh DecodePointer 13816->13817 13816->13818 13817->13816 13818->13799 13820 7ff8be58bb90 13819->13820 13820->13806 13820->13809 13821 7ff8be5975e9 13824 7ff8be5975fb 13821->13824 13826 7ff8be5975f4 13821->13826 13822 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13823 7ff8be597d85 13822->13823 13825 7ff8be58bd70 _invalid_parameter 17 API calls 13824->13825 13825->13826 13826->13822 13827 7ff8be5891ea 13828 7ff8be5891ef 13827->13828 13829 7ff8be5874e0 __crtExitProcess 3 API calls 13828->13829 13830 7ff8be589203 13829->13830 14771 7ff8be58d0ea 14773 7ff8be58d0ef 14771->14773 14772 7ff8be58d0fc 14773->14772 14774 7ff8be587090 _exit 33 API calls 14773->14774 14775 7ff8be58d209 14773->14775 14774->14775 14777 7ff8be58d289 14775->14777 14779 7ff8be583d00 RtlEncodePointer 14775->14779 14777->14772 14780 7ff8be589360 LeaveCriticalSection 14777->14780 14779->14777 14780->14772 14781 7ff8be599aeb 14782 7ff8be599b18 14781->14782 14783 7ff8be599b2c 14781->14783 14784 7ff8be599520 19 API calls 14782->14784 14785 7ff8be59ab10 17 API calls 14783->14785 14784->14783 14790 7ff8be599b38 14785->14790 14786 7ff8be599c04 14787 7ff8be59a1cb 14786->14787 14791 7ff8be599c23 GetConsoleCP 14786->14791 14788 7ff8be59a205 14787->14788 14789 7ff8be59a8ad WriteFile 14787->14789 14792 7ff8be59a400 14788->14792 14795 7ff8be59a21a 14788->14795 14793 7ff8be59a923 GetLastError 14789->14793 14806 7ff8be599dd9 _dosmaperr __doserrno 14789->14806 14790->14786 14794 7ff8be599bae GetConsoleMode 14790->14794 14814 7ff8be599c4d 14791->14814 14797 7ff8be59a40e 14792->14797 14812 7ff8be59a5f3 14792->14812 14793->14806 14794->14786 14798 7ff8be59a33e WriteFile 14795->14798 14795->14806 14796 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14802 7ff8be59a9f5 14796->14802 14803 7ff8be59a531 WriteFile 14797->14803 14797->14806 14798->14795 14801 7ff8be59a3ea GetLastError 14798->14801 14799 7ff8be599f66 WideCharToMultiByte 14804 7ff8be599fbf WriteFile 14799->14804 14799->14806 14800 7ff8be59a726 WideCharToMultiByte 14805 7ff8be59a791 GetLastError 14800->14805 14800->14812 14801->14806 14803->14797 14807 7ff8be59a5dd GetLastError 14803->14807 14808 7ff8be59a050 GetLastError 14804->14808 14804->14814 14805->14806 14806->14796 14807->14806 14808->14806 14808->14814 14809 7ff8be59a7b0 WriteFile 14811 7ff8be59a857 GetLastError 14809->14811 14809->14812 14810 7ff8be59fc00 WriteConsoleW CreateFileW _putwch_nolock 14810->14814 14811->14812 14812->14800 14812->14806 14812->14809 14813 7ff8be59a06d WriteFile 14813->14814 14817 7ff8be59a103 GetLastError 14813->14817 14814->14799 14814->14806 14814->14810 14814->14813 14815 7ff8be59a158 GetLastError 14814->14815 14816 7ff8be59f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 14814->14816 14818 7ff8be59a1b5 GetLastError 14814->14818 14815->14806 14816->14814 14817->14806 14818->14806 12656 7ff8be586ff2 12657 7ff8be586ffe 12656->12657 12660 7ff8be58ca00 12657->12660 12659 7ff8be587011 _initterm_e 12661 7ff8be58ca0e 12660->12661 12662 7ff8be58ca23 RtlEncodePointer 12661->12662 12663 7ff8be58ca4b 12661->12663 12662->12661 12663->12659 12415 21f07610000 12416 21f07610183 12415->12416 12417 21f0761043e VirtualAlloc 12416->12417 12421 21f07610462 12417->12421 12418 21f07610a7b 12419 21f07610531 GetNativeSystemInfo 12419->12418 12420 21f0761056d VirtualAlloc 12419->12420 12425 21f0761058b 12420->12425 12421->12418 12421->12419 12422 21f07610a00 12422->12418 12423 21f07610a56 RtlAddFunctionTable 12422->12423 12423->12418 12424 21f076109d9 VirtualProtect 12424->12425 12425->12422 12425->12424 14853 7ff8be5976c0 14854 7ff8be5976cf _CrtMemDumpAllObjectsSince 14853->14854 14855 7ff8be597be3 _CrtMemDumpAllObjectsSince 14853->14855 14857 7ff8be5976e6 _LocaleUpdate::~_LocaleUpdate 14854->14857 14858 7ff8be597905 _CrtMemDumpAllObjectsSince 14854->14858 14859 7ff8be5977f5 _CrtMemDumpAllObjectsSince wcsncnt 14854->14859 14856 7ff8be597cc6 WideCharToMultiByte 14855->14856 14855->14857 14856->14857 14860 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14857->14860 14861 7ff8be59790f WideCharToMultiByte 14858->14861 14864 7ff8be597827 WideCharToMultiByte 14859->14864 14862 7ff8be597d85 14860->14862 14863 7ff8be597965 14861->14863 14863->14857 14865 7ff8be59799a GetLastError 14863->14865 14864->14857 14865->14857 14867 7ff8be5979d3 _CrtMemDumpAllObjectsSince 14865->14867 14866 7ff8be597a05 WideCharToMultiByte 14866->14857 14866->14867 14867->14857 14867->14866 14868 7ff8be5a0ec0 14875 7ff8be589360 LeaveCriticalSection 14868->14875 14870 7ff8be5a0ed3 14876 7ff8be589360 LeaveCriticalSection 14870->14876 14872 7ff8be5a0ef3 14877 7ff8be589360 LeaveCriticalSection 14872->14877 14874 7ff8be5a0f13 14875->14870 14876->14872 14877->14874 13835 7ff8be599fba 13845 7ff8be599c4d 13835->13845 13836 7ff8be59a06d WriteFile 13837 7ff8be59a103 GetLastError 13836->13837 13836->13845 13842 7ff8be599dd9 _dosmaperr __doserrno 13837->13842 13838 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13839 7ff8be59a9f5 13838->13839 13840 7ff8be599f66 WideCharToMultiByte 13841 7ff8be599fbf WriteFile 13840->13841 13840->13842 13844 7ff8be59a050 GetLastError 13841->13844 13841->13845 13842->13838 13843 7ff8be59fc00 WriteConsoleW CreateFileW _putwch_nolock 13843->13845 13844->13842 13844->13845 13845->13836 13845->13840 13845->13842 13845->13843 13846 7ff8be59a158 GetLastError 13845->13846 13847 7ff8be59f330 MultiByteToWideChar MultiByteToWideChar wcsxfrm 13845->13847 13848 7ff8be59a1b5 GetLastError 13845->13848 13846->13842 13847->13845 13848->13842 14901 7ff8be5868c4 14902 7ff8be5868d1 14901->14902 14903 7ff8be586ba6 14902->14903 14906 7ff8be5868ed _CrtIsValidPointer 14902->14906 14919 7ff8be589360 LeaveCriticalSection 14903->14919 14905 7ff8be586bb0 14907 7ff8be58695e IsBadReadPtr 14906->14907 14909 7ff8be586976 14906->14909 14917 7ff8be58692f 14906->14917 14907->14909 14908 7ff8be586ad2 14911 7ff8be586add 14908->14911 14915 7ff8be586b2d 14908->14915 14909->14908 14910 7ff8be586a29 14909->14910 14912 7ff8be586abe 14910->14912 14913 7ff8be586a86 IsBadReadPtr 14910->14913 14914 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 14911->14914 14916 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 14912->14916 14913->14912 14913->14917 14914->14917 14915->14917 14918 7ff8be586bf0 _CrtMemDumpAllObjectsSince_stat 20 API calls 14915->14918 14916->14917 14918->14917 14919->14905 14920 7ff8be59bcbd 14921 7ff8be59b99c 14920->14921 14923 7ff8be59cc93 14921->14923 14926 7ff8be59bada 14921->14926 14922 7ff8be59bb0e _LocaleUpdate::~_LocaleUpdate 14925 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14922->14925 14923->14922 14924 7ff8be58bd70 _invalid_parameter 17 API calls 14923->14924 14924->14922 14927 7ff8be59cd90 14925->14927 14928 7ff8be58bd70 _invalid_parameter 17 API calls 14926->14928 14928->14922 13849 7ff8be5a11d0 13850 7ff8be5a11f7 ExFilterRethrow 13849->13850 13853 7ff8be58ed30 13850->13853 13852 7ff8be5a1212 _IsExceptionObjectToBeDestroyed __SehTransFilter 13854 7ff8be58ed3e 13853->13854 13856 7ff8be58ed4c 13854->13856 13859 7ff8be58cf80 DecodePointer 13854->13859 13857 7ff8be58cf80 _inconsistency 36 API calls 13856->13857 13858 7ff8be58ed88 13856->13858 13857->13858 13858->13852 13860 7ff8be58cf9e 13859->13860 13861 7ff8be58cf50 terminate 35 API calls 13860->13861 13862 7ff8be58cfa9 13861->13862 13862->13856 13867 7ff8be5833d6 13870 7ff8be5888d0 HeapDestroy 13867->13870 13869 7ff8be5833db 13870->13869 14940 7ff8be5834d5 14941 7ff8be5834da _calloc_dbg 14940->14941 14942 7ff8be58350b FlsSetValue 14941->14942 14946 7ff8be583548 14941->14946 14943 7ff8be583520 14942->14943 14942->14946 14944 7ff8be583e30 LeaveCriticalSection 14943->14944 14945 7ff8be58352c GetCurrentThreadId 14944->14945 14945->14946 13875 7ff8be59a7a0 13881 7ff8be59a61f 13875->13881 13876 7ff8be59a726 WideCharToMultiByte 13877 7ff8be59a791 GetLastError 13876->13877 13876->13881 13882 7ff8be59a887 _dosmaperr __doserrno 13877->13882 13878 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13883 7ff8be59a9f5 13878->13883 13879 7ff8be59a7b0 WriteFile 13880 7ff8be59a857 GetLastError 13879->13880 13879->13881 13880->13881 13881->13876 13881->13879 13881->13882 13882->13878 12436 7ff8be584399 12437 7ff8be584377 12436->12437 12438 7ff8be5843a6 12436->12438 12437->12436 12437->12438 12440 7ff8be58abb0 DecodePointer 12437->12440 12441 7ff8be58abd3 12440->12441 12441->12437 12442 7ff8be583599 12445 7ff8be588900 12442->12445 12444 7ff8be58359e 12446 7ff8be588920 12445->12446 12447 7ff8be588936 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 12445->12447 12446->12444 12448 7ff8be5889de 12447->12448 12448->12446 14959 7ff8be595a98 14960 7ff8be58cf50 terminate 35 API calls 14959->14960 14961 7ff8be595a9d 14960->14961 14979 7ff8be592c9f 14980 7ff8be592caf 14979->14980 14981 7ff8be592ca6 14979->14981 14981->14980 14982 7ff8be58bd70 _invalid_parameter 17 API calls 14981->14982 14982->14980 14983 7ff8be59809f 14984 7ff8be5980b0 _calloc_dbg_impl 14983->14984 14985 7ff8be598145 _calloc_dbg_impl 14983->14985 14985->14984 14986 7ff8be58bd70 _invalid_parameter 17 API calls 14985->14986 14986->14984 13907 7ff8be583faa 13908 7ff8be583e30 LeaveCriticalSection 13907->13908 13909 7ff8be583fb6 GetCurrentThreadId 13908->13909 13910 7ff8be583fea SetLastError 13909->13910 12621 7ff8be58aca8 12622 7ff8be58acb2 12621->12622 12626 7ff8be5874e0 12622->12626 12624 7ff8be58acbc RtlAllocateHeap 12629 7ff8be587490 GetModuleHandleW 12626->12629 12630 7ff8be5874d1 ExitProcess 12629->12630 12631 7ff8be5874b2 GetProcAddress 12629->12631 12631->12630 15005 7ff8be5810b0 15007 7ff8be5810da 15005->15007 15006 7ff8be5810fc 15009 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 15006->15009 15007->15006 15008 7ff8be581000 4 API calls 15007->15008 15008->15006 15010 7ff8be58112c 15009->15010 15011 7ff8be58c080 HeapValidate 15012 7ff8be58c0a2 15011->15012 13911 7ff8be59b580 13912 7ff8be59b5fa 13911->13912 13913 7ff8be59b676 13912->13913 13914 7ff8be59b6cb 13912->13914 13916 7ff8be58bd70 _invalid_parameter 17 API calls 13913->13916 13915 7ff8be59afb0 _fflush_nolock 17 API calls 13914->13915 13917 7ff8be59b6fe 13914->13917 13915->13917 13923 7ff8be59b6aa _LocaleUpdate::~_LocaleUpdate 13916->13923 13918 7ff8be59b84d 13917->13918 13919 7ff8be59b8a2 13917->13919 13920 7ff8be58bd70 _invalid_parameter 17 API calls 13918->13920 13921 7ff8be59b915 13919->13921 13927 7ff8be59b96a 13919->13927 13920->13923 13925 7ff8be58bd70 _invalid_parameter 17 API calls 13921->13925 13922 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 13924 7ff8be59cd90 13922->13924 13923->13922 13925->13923 13926 7ff8be59cc93 13926->13923 13928 7ff8be58bd70 _invalid_parameter 17 API calls 13926->13928 13927->13926 13929 7ff8be59bada 13927->13929 13928->13923 13930 7ff8be58bd70 _invalid_parameter 17 API calls 13929->13930 13930->13923 13953 7ff8be58c990 13957 7ff8be584980 13953->13957 13955 7ff8be58c9b8 EncodePointer 13956 7ff8be58c9e5 13955->13956 13958 7ff8be5849cb _calloc_dbg_impl 13957->13958 13958->13955 13959 7ff8be595393 13960 7ff8be5953a0 13959->13960 13961 7ff8be5953b4 __SehTransFilter 13960->13961 13962 7ff8be5953cc 13960->13962 13968 7ff8be5954a0 RaiseException 13961->13968 13969 7ff8be5954a0 RaiseException 13962->13969 13964 7ff8be5953ca 13966 7ff8be58ed30 _FindAndUnlinkFrame 36 API calls 13964->13966 13967 7ff8be5953e1 _IsExceptionObjectToBeDestroyed __SehTransFilter 13966->13967 13968->13964 13969->13964 15013 7ff8be592695 15014 7ff8be5926a0 15013->15014 15015 7ff8be58bd70 _invalid_parameter 17 API calls 15014->15015 15016 7ff8be5926ab 15014->15016 15015->15016 15017 7ff8be594a95 15019 7ff8be594aad __SehTransFilter 15017->15019 15018 7ff8be594c2b 15019->15018 15020 7ff8be595180 __SehTransFilter 38 API calls 15019->15020 15020->15018 13988 7ff8be59df8d 13989 7ff8be59dfbb 13988->13989 13990 7ff8be59eadf 13989->13990 13991 7ff8be59eec0 25 API calls 13989->13991 14002 7ff8be59da75 13989->14002 13992 7ff8be59ef10 25 API calls 13990->13992 13991->13990 13994 7ff8be59eafd 13992->13994 13993 7ff8be59eb33 13995 7ff8be59ec29 13993->13995 14009 7ff8be59eb49 _CrtMemDumpAllObjectsSince 13993->14009 13994->13993 13996 7ff8be59eec0 25 API calls 13994->13996 13998 7ff8be59ebda 13995->13998 13999 7ff8be59ef10 25 API calls 13995->13999 13996->13993 13997 7ff8be59eca1 14001 7ff8be58bd70 _invalid_parameter 17 API calls 13997->14001 14004 7ff8be59dbe9 _LocaleUpdate::~_LocaleUpdate 13997->14004 14000 7ff8be59eec0 25 API calls 13998->14000 13998->14002 13999->13998 14000->14002 14001->14004 14002->13997 14003 7ff8be59dbb5 14002->14003 14007 7ff8be58bd70 _invalid_parameter 17 API calls 14003->14007 14005 7ff8be583280 _CrtMemDumpAllObjectsSince_stat 8 API calls 14004->14005 14006 7ff8be59ed9e 14005->14006 14007->14004 14008 7ff8be59f000 wcsxfrm 2 API calls 14008->14009 14009->13998 14009->14008 14010 7ff8be59ee40 25 API calls 14009->14010 14010->14009

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 15 21f07610000-21f07610460 call 21f07610aa8 * 2 VirtualAlloc 37 21f07610462-21f07610466 15->37 38 21f0761048a-21f07610494 15->38 39 21f07610468-21f07610488 37->39 41 21f07610a91-21f07610aa6 38->41 42 21f0761049a-21f0761049e 38->42 39->38 39->39 42->41 43 21f076104a4-21f076104a8 42->43 43->41 44 21f076104ae-21f076104b2 43->44 44->41 45 21f076104b8-21f076104bf 44->45 45->41 46 21f076104c5-21f076104d2 45->46 46->41 47 21f076104d8-21f076104e1 46->47 47->41 48 21f076104e7-21f076104f4 47->48 48->41 49 21f076104fa-21f07610507 48->49 50 21f07610531-21f07610567 GetNativeSystemInfo 49->50 51 21f07610509-21f07610511 49->51 50->41 52 21f0761056d-21f07610589 VirtualAlloc 50->52 53 21f07610513-21f07610518 51->53 54 21f076105a0-21f076105ac 52->54 55 21f0761058b-21f0761059e 52->55 56 21f07610521 53->56 57 21f0761051a-21f0761051f 53->57 58 21f076105af-21f076105b2 54->58 55->54 59 21f07610523-21f0761052f 56->59 57->59 61 21f076105c1-21f076105db 58->61 62 21f076105b4-21f076105bf 58->62 59->50 59->53 63 21f0761061b-21f07610622 61->63 64 21f076105dd-21f076105e2 61->64 62->58 66 21f07610628-21f0761062f 63->66 67 21f076106db-21f076106e2 63->67 65 21f076105e4-21f076105ea 64->65 70 21f076105ec-21f07610609 65->70 71 21f0761060b-21f07610619 65->71 66->67 72 21f07610635-21f07610642 66->72 68 21f07610864-21f0761086b 67->68 69 21f076106e8-21f076106f9 67->69 75 21f07610871-21f0761087f 68->75 76 21f07610917-21f07610929 68->76 74 21f07610702-21f07610705 69->74 70->70 70->71 71->63 71->65 72->67 73 21f07610648-21f0761064f 72->73 77 21f07610654-21f07610658 73->77 78 21f07610707-21f0761070a 74->78 79 21f076106fb-21f076106ff 74->79 82 21f0761090e-21f07610911 75->82 80 21f0761092f-21f07610937 76->80 81 21f07610a07-21f07610a1a 76->81 83 21f076106c0-21f076106ca 77->83 84 21f07610788-21f0761078e 78->84 85 21f0761070c-21f0761071d 78->85 79->74 87 21f0761093b-21f0761093f 80->87 102 21f07610a40-21f07610a4a 81->102 103 21f07610a1c-21f07610a27 81->103 82->76 86 21f07610884-21f076108a9 82->86 93 21f0761065a-21f07610669 83->93 94 21f076106cc-21f076106d2 83->94 91 21f07610794-21f076107a2 84->91 90 21f0761071f-21f07610720 85->90 85->91 107 21f07610907-21f0761090c 86->107 108 21f076108ab-21f076108b1 86->108 88 21f07610945-21f0761095a 87->88 89 21f076109ec-21f076109fa 87->89 96 21f0761095c-21f0761095e 88->96 97 21f0761097b-21f0761097d 88->97 89->87 98 21f07610a00-21f07610a01 89->98 101 21f07610722-21f07610784 90->101 104 21f076107a8 91->104 105 21f0761085d-21f0761085e 91->105 99 21f0761067a-21f0761067e 93->99 100 21f0761066b-21f07610678 93->100 94->77 106 21f076106d4-21f076106d5 94->106 109 21f07610960-21f0761096c 96->109 110 21f0761096e-21f07610979 96->110 112 21f0761097f-21f07610981 97->112 113 21f076109a2-21f076109a4 97->113 98->81 114 21f07610680-21f0761068a 99->114 115 21f0761068c-21f07610690 99->115 111 21f076106bd-21f076106be 100->111 101->101 116 21f07610786 101->116 119 21f07610a4c-21f07610a54 102->119 120 21f07610a7b-21f07610a8e 102->120 117 21f07610a38-21f07610a3e 103->117 118 21f076107ae-21f076107d4 104->118 105->68 106->67 107->82 129 21f076108b3-21f076108b9 108->129 130 21f076108bb-21f076108c8 108->130 121 21f076109be-21f076109bf 109->121 110->121 111->83 122 21f07610983-21f07610987 112->122 123 21f07610989-21f0761098b 112->123 127 21f076109a6-21f076109aa 113->127 128 21f076109ac-21f076109bb 113->128 124 21f076106b6-21f076106ba 114->124 125 21f07610692-21f076106a3 115->125 126 21f076106a5-21f076106a9 115->126 116->91 117->102 131 21f07610a29-21f07610a35 117->131 146 21f076107d6-21f076107d9 118->146 147 21f07610835-21f07610839 118->147 119->120 132 21f07610a56-21f07610a79 RtlAddFunctionTable 119->132 120->41 136 21f076109c5-21f076109cb 121->136 122->121 123->113 134 21f0761098d-21f0761098f 123->134 124->111 125->124 126->111 135 21f076106ab-21f076106b3 126->135 127->121 128->121 137 21f076108ea-21f076108fe 129->137 138 21f076108d3-21f076108e5 130->138 139 21f076108ca-21f076108d1 130->139 131->117 132->120 141 21f07610991-21f07610997 134->141 142 21f07610999-21f076109a0 134->142 135->124 143 21f076109d9-21f076109e9 VirtualProtect 136->143 144 21f076109cd-21f076109d3 136->144 137->107 157 21f07610900-21f07610905 137->157 138->137 139->138 139->139 141->121 142->136 143->89 144->143 151 21f076107e3-21f076107f0 146->151 152 21f076107db-21f076107e1 146->152 148 21f07610844-21f07610850 147->148 149 21f0761083b 147->149 148->118 156 21f07610856-21f07610857 148->156 149->148 154 21f076107f2-21f076107f9 151->154 155 21f076107fb-21f0761080d 151->155 153 21f07610812-21f0761082c 152->153 153->147 159 21f0761082e-21f07610833 153->159 154->154 154->155 155->153 156->105 157->108 159->146
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.420841262.0000021F07610000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000021F07610000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_21f07610000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                      • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                      • API String ID: 394283112-2517549848
                                                                      • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                      • Instruction ID: 645b79fd6949df4e0fb569d52c70642c16b67fe3f5446e6969404cdb8441e4ea
                                                                      • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                      • Instruction Fuzzy Hash: 1F72E670618A488BDB59DF18C9897F9B7E0FBA8304F14462DE8DBC3256DB34D981CB85
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.421003664.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000003.00000002.420998201.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421033169.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421044533.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421051585.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff8be580000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleName__initmbctable
                                                                      • String ID: C:\Windows\system32\rundll32.exe$f:\dd\vctools\crt_bld\self_64_amd64\crt\src\stdargv.c
                                                                      • API String ID: 3548084100-3042134252
                                                                      • Opcode ID: b22e410beffd46978b7d2afc3cd069083579849eea9e12d44582c014dad21e95
                                                                      • Instruction ID: 9b71ddf481af9c2b071ab898d8cf9adc66a5cf30f64e3e198c67a9857980b798
                                                                      • Opcode Fuzzy Hash: b22e410beffd46978b7d2afc3cd069083579849eea9e12d44582c014dad21e95
                                                                      • Instruction Fuzzy Hash: 3241003162DA8589EA60CB58ECA037A7760FB857E4F901636E7AE42BF5DF3DD1448700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • HeapCreate.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE5833C2), ref: 00007FF8BE588876
                                                                      • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE5833C2), ref: 00007FF8BE588891
                                                                      • HeapSetInformation.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE5833C2), ref: 00007FF8BE5888BB
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.421003664.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000003.00000002.420998201.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421033169.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421044533.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421051585.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff8be580000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$CreateInformationVersion
                                                                      • String ID:
                                                                      • API String ID: 3563531100-0
                                                                      • Opcode ID: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                      • Instruction ID: 292bf58d6a90646777cd49f4198f57822d7e6d455680c6bdc40ffc38dedd27e6
                                                                      • Opcode Fuzzy Hash: 48cf33cfee9be34a63005782b3e03b00dcbae59413766f72d2946869900c76f4
                                                                      • Instruction Fuzzy Hash: 16F05E78A1CA468AF7609718EC2A3792390FF48384FD09834D74D82AA5DE3D9589C700
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.421003664.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000003.00000002.420998201.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421033169.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421044533.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421051585.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff8be580000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID: EncodePointer_initterm_e
                                                                      • String ID: Y
                                                                      • API String ID: 1618838664-1754117475
                                                                      • Opcode ID: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                      • Instruction ID: a043831bfcc157604c17ed546d40a1a8d8baf6670eac9e71cad80ef11757f7f4
                                                                      • Opcode Fuzzy Hash: 24d3616295d43623420cef2980f0f4d1896d7dbbaf9113ec39dfe7d3f9684184
                                                                      • Instruction Fuzzy Hash: EEE0C93191C442DFE620EB28EC711B92765FF903C4F801231E39D824A6EF2CE984CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 517 7ff8be58a000-7ff8be58a037 call 7ff8be589f20 520 7ff8be58a039-7ff8be58a048 call 7ff8be58a4e0 517->520 521 7ff8be58a04d-7ff8be58a069 517->521 531 7ff8be58a463-7ff8be58a474 call 7ff8be583280 520->531 524 7ff8be58a239-7ff8be58a241 521->524 525 7ff8be58a06f-7ff8be58a088 521->525 529 7ff8be58a271-7ff8be58a276 524->529 530 7ff8be58a243-7ff8be58a24e 524->530 527 7ff8be58a234 525->527 528 7ff8be58a08e-7ff8be58a096 525->528 527->524 533 7ff8be58a0a2-7ff8be58a0aa 528->533 529->531 530->529 534 7ff8be58a250-7ff8be58a25b 530->534 536 7ff8be58a0ac-7ff8be58a0bd 533->536 537 7ff8be58a0bf-7ff8be58a0c7 533->537 534->529 538 7ff8be58a25d-7ff8be58a26f IsValidCodePage 534->538 536->533 539 7ff8be58a0d3-7ff8be58a0d8 537->539 538->529 541 7ff8be58a27b-7ff8be58a28f GetCPInfo 538->541 542 7ff8be58a197-7ff8be58a1db call 7ff8be58a480 539->542 543 7ff8be58a0de-7ff8be58a101 539->543 544 7ff8be58a444-7ff8be58a44b 541->544 545 7ff8be58a295-7ff8be58a29d 541->545 557 7ff8be58a1e7-7ff8be58a1ec 542->557 547 7ff8be58a111-7ff8be58a11b 543->547 548 7ff8be58a44d-7ff8be58a45c call 7ff8be58a4e0 544->548 549 7ff8be58a45e 544->549 546 7ff8be58a2a9-7ff8be58a2b1 545->546 552 7ff8be58a2b3-7ff8be58a2c4 546->552 553 7ff8be58a2c6-7ff8be58a2ec 546->553 554 7ff8be58a192 547->554 555 7ff8be58a11d-7ff8be58a128 547->555 548->531 549->531 552->546 559 7ff8be58a2f2-7ff8be58a2fc 553->559 560 7ff8be58a3f4-7ff8be58a3fc 553->560 554->539 555->554 561 7ff8be58a12a-7ff8be58a136 555->561 564 7ff8be58a220-7ff8be58a22f call 7ff8be58a5e0 557->564 565 7ff8be58a1ee-7ff8be58a21e 557->565 566 7ff8be58a30c-7ff8be58a316 559->566 567 7ff8be58a403-7ff8be58a40b 560->567 568 7ff8be58a142-7ff8be58a14f 561->568 564->531 565->557 572 7ff8be58a318-7ff8be58a323 566->572 573 7ff8be58a37c-7ff8be58a384 566->573 571 7ff8be58a417-7ff8be58a41c 567->571 574 7ff8be58a151-7ff8be58a18b 568->574 575 7ff8be58a18d 568->575 577 7ff8be58a433-7ff8be58a43b call 7ff8be58a5e0 571->577 578 7ff8be58a41e-7ff8be58a431 571->578 572->573 579 7ff8be58a325-7ff8be58a331 572->579 582 7ff8be58a390-7ff8be58a398 573->582 574->568 575->547 592 7ff8be58a440-7ff8be58a442 577->592 578->571 586 7ff8be58a33d-7ff8be58a34a 579->586 583 7ff8be58a3c8-7ff8be58a3f2 call 7ff8be58a480 582->583 584 7ff8be58a39a-7ff8be58a3c6 582->584 583->567 584->582 590 7ff8be58a37a 586->590 591 7ff8be58a34c-7ff8be58a378 586->591 590->566 591->586 592->531
                                                                      C-Code - Quality: 47%
                                                                      			E00007FF87FF8BE58A000(signed short __ecx, void* __rcx, long long __rdx, signed int _a8, void* _a16) {
                                                                      				signed int _v24;
                                                                      				signed char* _v32;
                                                                      				char _v50;
                                                                      				char _v56;
                                                                      				signed int _v72;
                                                                      				signed char* _v80;
                                                                      				signed int _v84;
                                                                      				signed int _v88;
                                                                      				signed long long _t204;
                                                                      				signed long long _t205;
                                                                      				signed long long _t206;
                                                                      				signed char* _t215;
                                                                      				signed long long _t218;
                                                                      				signed long long _t233;
                                                                      				signed long long _t234;
                                                                      
                                                                      				_a16 = __rdx;
                                                                      				_a8 = __ecx;
                                                                      				_t204 =  *0xbe5ab018; // 0x6e64d8865048
                                                                      				_t205 = _t204 ^ _t234;
                                                                      				_v24 = _t205;
                                                                      				_a8 = E00007FF87FF8BE589F20(_a8, _t205);
                                                                      				if (_a8 != 0) goto 0xbe58a04d;
                                                                      				E00007FF87FF8BE58A4E0(_a16);
                                                                      				goto 0xbe58a463;
                                                                      				_v84 = 0;
                                                                      				_v84 = _v84 + 1;
                                                                      				if (_t205 - 5 >= 0) goto 0xbe58a239;
                                                                      				_t206 = _t205 * 0x30;
                                                                      				if ( *((intOrPtr*)(0xbe5abb70 + _t206)) != _a8) goto 0xbe58a234;
                                                                      				_v72 = 0;
                                                                      				goto 0xbe58a0a2;
                                                                      				_v72 = _v72 + 1;
                                                                      				if (_v72 - 0x101 >= 0) goto 0xbe58a0bf;
                                                                      				 *((char*)(_a16 + _t206 + 0x1c)) = 0;
                                                                      				goto 0xbe58a098;
                                                                      				_v88 = 0;
                                                                      				goto 0xbe58a0d3;
                                                                      				_v88 = _v88 + 1;
                                                                      				if (_v88 - 4 >= 0) goto 0xbe58a197;
                                                                      				_v80 = 0x47fbeb1309700;
                                                                      				goto 0xbe58a111;
                                                                      				_v80 =  &(_v80[2]);
                                                                      				if (( *_v80 & 0x000000ff) == 0) goto 0xbe58a192;
                                                                      				if ((_v80[1] & 0x000000ff) == 0) goto 0xbe58a192;
                                                                      				_v72 =  *_v80 & 0x000000ff;
                                                                      				goto 0xbe58a142;
                                                                      				_v72 = _v72 + 1;
                                                                      				_t215 = _v80;
                                                                      				if (_v72 - ( *(_t215 + 1) & 0x000000ff) > 0) goto 0xbe58a18d;
                                                                      				_t233 = _a16;
                                                                      				 *((char*)(_t233 + 0xbe5abb70 + _t206 * 0x30 + 0x1c)) =  *(_a16 + _t215 + 0x1c) & 0x000000ff |  *0xFFF17CB576D8;
                                                                      				goto 0xbe58a138;
                                                                      				goto 0xbe58a103;
                                                                      				goto 0xbe58a0c9;
                                                                      				 *(_a16 + 4) = _a8;
                                                                      				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                      				_t218 = _a16;
                                                                      				 *(_a16 + 0xc) = E00007FF87FF8BE58A480( *((intOrPtr*)(_t218 + 4)));
                                                                      				_v88 = 0;
                                                                      				goto 0xbe58a1e7;
                                                                      				_v88 = _v88 + 1;
                                                                      				if (_v88 - 6 >= 0) goto 0xbe58a220;
                                                                      				_t205 = 0xbe5abb70;
                                                                      				 *((short*)(_a16 + 0x10 + _t233 * 2)) =  *(0xbe5abb70 + 4 + (0xbe5abb70 + _t218 * 0x30) * 2) & 0x0000ffff;
                                                                      				goto 0xbe58a1dd;
                                                                      				E00007FF87FF8BE58A5E0(_a16);
                                                                      				goto 0xbe58a463;
                                                                      				goto L1;
                                                                      				if (_a8 == 0) goto 0xbe58a271;
                                                                      				if (_a8 == 0xfde8) goto 0xbe58a271;
                                                                      				if (_a8 == 0xfde9) goto 0xbe58a271;
                                                                      				__eax = _a8 & 0x0000ffff;
                                                                      				__ecx = _a8 & 0x0000ffff;
                                                                      				if (IsValidCodePage(??) != 0) goto 0xbe58a27b;
                                                                      				__eax = 0xffffffff;
                                                                      				goto 0xbe58a463;
                                                                      				__rdx =  &_v56;
                                                                      				__ecx = _a8;
                                                                      				if (GetCPInfo(??, ??) == 0) goto 0xbe58a444;
                                                                      				_v72 = 0;
                                                                      				goto 0xbe58a2a9;
                                                                      				_v72 = _v72 + 1;
                                                                      				_v72 = _v72 + 1;
                                                                      				if (_v72 - 0x101 >= 0) goto 0xbe58a2c6;
                                                                      				__eax = _v72;
                                                                      				__rcx = _a16;
                                                                      				 *((char*)(_a16 + __rax + 0x1c)) = 0;
                                                                      				goto 0xbe58a29f;
                                                                      				__rax = _a16;
                                                                      				__ecx = _a8;
                                                                      				 *(_a16 + 4) = _a8;
                                                                      				__rax = _a16;
                                                                      				 *(_a16 + 0xc) = 0;
                                                                      				if (_v56 - 1 <= 0) goto 0xbe58a3f4;
                                                                      				__rax =  &_v50;
                                                                      				_v32 =  &_v50;
                                                                      				goto 0xbe58a30c;
                                                                      				_v32 =  &(_v32[2]);
                                                                      				_v32 =  &(_v32[2]);
                                                                      				__rax = _v32;
                                                                      				__eax =  *_v32 & 0x000000ff;
                                                                      				if (( *_v32 & 0x000000ff) == 0) goto 0xbe58a37c;
                                                                      				__rax = _v32;
                                                                      				__eax =  *(__rax + 1) & 0x000000ff;
                                                                      				if (( *(__rax + 1) & 0x000000ff) == 0) goto 0xbe58a37c;
                                                                      				__rax = _v32;
                                                                      				__eax =  *_v32 & 0x000000ff;
                                                                      				_v72 =  *_v32 & 0x000000ff;
                                                                      				goto 0xbe58a33d;
                                                                      				_v72 = _v72 + 1;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rax = _v32;
                                                                      				__eax =  *(__rax + 1) & 0x000000ff;
                                                                      				if (_v72 - ( *(__rax + 1) & 0x000000ff) > 0) goto 0xbe58a37a;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rcx = _a16;
                                                                      				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000004;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rdx = _a16;
                                                                      				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                      				goto 0xbe58a333;
                                                                      				goto 0xbe58a2fe;
                                                                      				_v72 = 1;
                                                                      				goto 0xbe58a390;
                                                                      				_v72 = _v72 + 1;
                                                                      				_v72 = _v72 + 1;
                                                                      				if (_v72 - 0xff >= 0) goto 0xbe58a3c8;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rcx = _a16;
                                                                      				 *(__rcx + __rax + 0x1c) & 0x000000ff =  *(__rcx + __rax + 0x1c) & 0x000000ff | 0x00000008;
                                                                      				_v72 = _v72 + 1;
                                                                      				__rdx = _a16;
                                                                      				 *((char*)(_a16 + __rcx + 0x1c)) = __al;
                                                                      				goto 0xbe58a386;
                                                                      				__rax = _a16;
                                                                      				__ecx =  *(_a16 + 4);
                                                                      				__eax = E00007FF87FF8BE58A480( *(_a16 + 4));
                                                                      				__rcx = _a16;
                                                                      				 *(_a16 + 0xc) = __eax;
                                                                      				__rax = _a16;
                                                                      				 *((intOrPtr*)(_a16 + 8)) = 1;
                                                                      				goto 0xbe58a403;
                                                                      				__rax = _a16;
                                                                      				 *(__rax + 8) = 0;
                                                                      				_v88 = 0;
                                                                      				goto 0xbe58a417;
                                                                      				_v88 = _v88 + 1;
                                                                      				_v88 = _v88 + 1;
                                                                      				if (_v88 - 6 >= 0) goto 0xbe58a433;
                                                                      				__eax = _v88;
                                                                      				__ecx = 0;
                                                                      				__rdx = _a16;
                                                                      				 *((short*)(_a16 + 0x10 + __rax * 2)) = __cx;
                                                                      				goto 0xbe58a40d;
                                                                      				__rcx = _a16;
                                                                      				__eax = E00007FF87FF8BE58A5E0(_a16); // executed
                                                                      				__eax = 0;
                                                                      				goto 0xbe58a463;
                                                                      				if ( *0xbe5acd68 == 0) goto 0xbe58a45e;
                                                                      				__rcx = _a16;
                                                                      				E00007FF87FF8BE58A4E0(_a16) = 0;
                                                                      				goto 0xbe58a463;
                                                                      				__eax = 0xffffffff;
                                                                      				__rcx = _v24;
                                                                      				__rcx = _v24 ^ __rsp;
                                                                      				return E00007FF87FF8BE583280(0xffffffff, __ecx, __edx, _v24 ^ __rsp, __rdx, __r8);
                                                                      			}


















                                                                      0x7ff8be58a000
                                                                      0x7ff8be58a005
                                                                      0x7ff8be58a00d
                                                                      0x7ff8be58a014
                                                                      0x7ff8be58a017
                                                                      0x7ff8be58a028
                                                                      0x7ff8be58a037
                                                                      0x7ff8be58a041
                                                                      0x7ff8be58a048
                                                                      0x7ff8be58a04d
                                                                      0x7ff8be58a05d
                                                                      0x7ff8be58a069
                                                                      0x7ff8be58a073
                                                                      0x7ff8be58a088
                                                                      0x7ff8be58a08e
                                                                      0x7ff8be58a096
                                                                      0x7ff8be58a09e
                                                                      0x7ff8be58a0aa
                                                                      0x7ff8be58a0b8
                                                                      0x7ff8be58a0bd
                                                                      0x7ff8be58a0bf
                                                                      0x7ff8be58a0c7
                                                                      0x7ff8be58a0cf
                                                                      0x7ff8be58a0d8
                                                                      0x7ff8be58a0fc
                                                                      0x7ff8be58a101
                                                                      0x7ff8be58a10c
                                                                      0x7ff8be58a11b
                                                                      0x7ff8be58a128
                                                                      0x7ff8be58a132
                                                                      0x7ff8be58a136
                                                                      0x7ff8be58a13e
                                                                      0x7ff8be58a142
                                                                      0x7ff8be58a14f
                                                                      0x7ff8be58a17f
                                                                      0x7ff8be58a187
                                                                      0x7ff8be58a18b
                                                                      0x7ff8be58a18d
                                                                      0x7ff8be58a192
                                                                      0x7ff8be58a1a6
                                                                      0x7ff8be58a1b1
                                                                      0x7ff8be58a1b8
                                                                      0x7ff8be58a1d0
                                                                      0x7ff8be58a1d3
                                                                      0x7ff8be58a1db
                                                                      0x7ff8be58a1e3
                                                                      0x7ff8be58a1ec
                                                                      0x7ff8be58a200
                                                                      0x7ff8be58a218
                                                                      0x7ff8be58a21e
                                                                      0x7ff8be58a228
                                                                      0x7ff8be58a22f
                                                                      0x7ff8be58a234
                                                                      0x7ff8be58a241
                                                                      0x7ff8be58a24e
                                                                      0x7ff8be58a25b
                                                                      0x7ff8be58a25d
                                                                      0x7ff8be58a265
                                                                      0x7ff8be58a26f
                                                                      0x7ff8be58a271
                                                                      0x7ff8be58a276
                                                                      0x7ff8be58a27b
                                                                      0x7ff8be58a280
                                                                      0x7ff8be58a28f
                                                                      0x7ff8be58a295
                                                                      0x7ff8be58a29d
                                                                      0x7ff8be58a2a3
                                                                      0x7ff8be58a2a5
                                                                      0x7ff8be58a2b1
                                                                      0x7ff8be58a2b3
                                                                      0x7ff8be58a2b7
                                                                      0x7ff8be58a2bf
                                                                      0x7ff8be58a2c4
                                                                      0x7ff8be58a2c6
                                                                      0x7ff8be58a2ce
                                                                      0x7ff8be58a2d5
                                                                      0x7ff8be58a2d8
                                                                      0x7ff8be58a2e0
                                                                      0x7ff8be58a2ec
                                                                      0x7ff8be58a2f2
                                                                      0x7ff8be58a2f7
                                                                      0x7ff8be58a2fc
                                                                      0x7ff8be58a303
                                                                      0x7ff8be58a307
                                                                      0x7ff8be58a30c
                                                                      0x7ff8be58a311
                                                                      0x7ff8be58a316
                                                                      0x7ff8be58a318
                                                                      0x7ff8be58a31d
                                                                      0x7ff8be58a323
                                                                      0x7ff8be58a325
                                                                      0x7ff8be58a32a
                                                                      0x7ff8be58a32d
                                                                      0x7ff8be58a331
                                                                      0x7ff8be58a337
                                                                      0x7ff8be58a339
                                                                      0x7ff8be58a33d
                                                                      0x7ff8be58a342
                                                                      0x7ff8be58a34a
                                                                      0x7ff8be58a350
                                                                      0x7ff8be58a354
                                                                      0x7ff8be58a361
                                                                      0x7ff8be58a368
                                                                      0x7ff8be58a36c
                                                                      0x7ff8be58a374
                                                                      0x7ff8be58a378
                                                                      0x7ff8be58a37a
                                                                      0x7ff8be58a37c
                                                                      0x7ff8be58a384
                                                                      0x7ff8be58a38a
                                                                      0x7ff8be58a38c
                                                                      0x7ff8be58a398
                                                                      0x7ff8be58a39e
                                                                      0x7ff8be58a3a2
                                                                      0x7ff8be58a3af
                                                                      0x7ff8be58a3b6
                                                                      0x7ff8be58a3ba
                                                                      0x7ff8be58a3c2
                                                                      0x7ff8be58a3c6
                                                                      0x7ff8be58a3c8
                                                                      0x7ff8be58a3d0
                                                                      0x7ff8be58a3d3
                                                                      0x7ff8be58a3d8
                                                                      0x7ff8be58a3e0
                                                                      0x7ff8be58a3e3
                                                                      0x7ff8be58a3eb
                                                                      0x7ff8be58a3f2
                                                                      0x7ff8be58a3f4
                                                                      0x7ff8be58a3fc
                                                                      0x7ff8be58a403
                                                                      0x7ff8be58a40b
                                                                      0x7ff8be58a411
                                                                      0x7ff8be58a413
                                                                      0x7ff8be58a41c
                                                                      0x7ff8be58a41e
                                                                      0x7ff8be58a422
                                                                      0x7ff8be58a424
                                                                      0x7ff8be58a42c
                                                                      0x7ff8be58a431
                                                                      0x7ff8be58a433
                                                                      0x7ff8be58a43b
                                                                      0x7ff8be58a440
                                                                      0x7ff8be58a442
                                                                      0x7ff8be58a44b
                                                                      0x7ff8be58a44d
                                                                      0x7ff8be58a45a
                                                                      0x7ff8be58a45c
                                                                      0x7ff8be58a45e
                                                                      0x7ff8be58a463
                                                                      0x7ff8be58a468
                                                                      0x7ff8be58a474

                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.421003664.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000003.00000002.420998201.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421033169.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421044533.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421051585.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff8be580000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID: Locale$UpdateUpdate::~_
                                                                      • String ID:
                                                                      • API String ID: 1901436342-0
                                                                      • Opcode ID: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                      • Instruction ID: 350caea09f960079d10ae4aabd39b20d31537501ae58893ad220aa9297d968fe
                                                                      • Opcode Fuzzy Hash: bd1aa9bb27f65b33b611181b282d42369fc0b805d559ad423015dd3100174c74
                                                                      • Instruction Fuzzy Hash: E9D10C3261C6818AD7B4CB19E89462AB7A0F788794F409635E7DE8379ADF3CD545CF00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      C-Code - Quality: 58%
                                                                      			E00007FF87FF8BE584399(long long __rax, long long _a48, intOrPtr _a80, intOrPtr _a88, void* _a120) {
                                                                      
                                                                      				_a48 = __rax;
                                                                      				if (_a48 == 0) goto 0xbe5843ad;
                                                                      				goto 0xbe5843f5;
                                                                      				if (_a88 != 0) goto 0xbe5843ce;
                                                                      				if (_a120 == 0) goto 0xbe5843c7;
                                                                      				 *_a120 = 0xc;
                                                                      				goto 0xbe5843f5;
                                                                      				if (E00007FF87FF8BE58ABB0(_a48, _a80) != 0) goto 0xbe5843f3;
                                                                      				if (_a120 == 0) goto 0xbe5843ef;
                                                                      				 *_a120 = 0xc;
                                                                      				goto 0xbe5843f5;
                                                                      				goto 0xbe584377;
                                                                      				return 0;
                                                                      			}



                                                                      0x7ff8be584399
                                                                      0x7ff8be5843a4
                                                                      0x7ff8be5843ab
                                                                      0x7ff8be5843b2
                                                                      0x7ff8be5843ba
                                                                      0x7ff8be5843c1
                                                                      0x7ff8be5843cc
                                                                      0x7ff8be5843da
                                                                      0x7ff8be5843e2
                                                                      0x7ff8be5843e9
                                                                      0x7ff8be5843f1
                                                                      0x7ff8be5843f3
                                                                      0x7ff8be5843f9

                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.421003664.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000003.00000002.420998201.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421033169.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421044533.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421051585.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff8be580000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                      • Instruction ID: fa6ec6195a64310b6e43543d3c0d30f3a34b01bd4c54d0d10e8a3d4d812a3887
                                                                      • Opcode Fuzzy Hash: 1ac0a5da81333129a8f229358abc3f3628bfe7ae3225332448e9bf5308d83ad5
                                                                      • Instruction Fuzzy Hash: 9D019536A1CB45CAF6608B19E85472EA7A0F7947D4F201135EF9D46BAADF7CE480CB00
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      APIs
                                                                      • _ioterm.LIBCMTD ref: 00007FF8BE583437
                                                                        • Part of subcall function 00007FF8BE587D00: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF8BE58343C), ref: 00007FF8BE587D93
                                                                        • Part of subcall function 00007FF8BE583E00: FlsFree.KERNEL32 ref: 00007FF8BE583E13
                                                                        • Part of subcall function 00007FF8BE583E00: _mtdeletelocks.LIBCMTD ref: 00007FF8BE583E23
                                                                        • Part of subcall function 00007FF8BE5888D0: HeapDestroy.KERNEL32 ref: 00007FF8BE5888DB
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.421003664.00007FF8BE581000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BE580000, based on PE: true
                                                                      • Associated: 00000003.00000002.420998201.00007FF8BE580000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421033169.00007FF8BE5A2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421044533.00007FF8BE5AB000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000003.00000002.421051585.00007FF8BE5AF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff8be580000_rundll32.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalDeleteDestroyFreeHeapSection_ioterm_mtdeletelocks
                                                                      • String ID:
                                                                      • API String ID: 1508997487-0
                                                                      • Opcode ID: 8f8406f5a5b9feed6255c52f4e6aa9aa0153dd1bc57843c66d7c8198eef2426a
                                                                      • Instruction ID: dac1471495299f566adcdce9f17121bb133db70b5447fa0d42e6de839fc31a7a
                                                                      • Opcode Fuzzy Hash: 8f8406f5a5b9feed6255c52f4e6aa9aa0153dd1bc57843c66d7c8198eef2426a
                                                                      • Instruction Fuzzy Hash: D0E06770E0C0039EF352A76C9C722B91690AF547C2F801972E32EC62E3EE9DB8004671
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%